Professional Documents
Culture Documents
1-1-2013
Cyber Commodification
Miriam A. Cherry
Recommended Citation
Miriam A. Cherry, Cyber Commodification, 72 Md. L. Rev. 381 (2013)
Available at: http://digitalcommons.law.umaryland.edu/mlr/vol72/iss2/2
This Articles & Essays is brought to you for free and open access by the Academic Journals at DigitalCommons@UM Carey Law. It has been accepted
for inclusion in Maryland Law Review by an authorized administrator of DigitalCommons@UM Carey Law. For more information, please contact
PBluh@law.umaryland.edu.
Articles
CYBER COMMODIFICATION
MIRIAM A. CHERRY ∗
INTRODUCTION
Last year, the Huffington Post blog found itself involved in a con-
tentious legal dispute with its unpaid bloggers about the commodifi-
1
cation of its content. The Huffington Post features many posts that are
2
straight-ahead news reports; other posts have featured more ideolog-
3
ical content aimed at a liberal audience. Leading up to the 2008
381
382 MARYLAND LAW REVIEW [Vol. 72:381
ington-aol-20110209 (stating that the Huffington Post tailors its content to its “overwhelm-
ingly liberal audience”).
4. See, e.g., Shayana Kadidal, Guantanamo, Six Years Later, HUFFINGTON POST (Jan. 11,
2008), http://www.huffingtonpost.com/shayana-kadidal/guantanamo-six-years-late_b_810
25.html (criticizing the Bush administration on its operation of Guantanamo Bay). For
the Huffington Post’s current stance on this issue, see Ben Fox, Guantanamo Closure Hopes
Fade as Prison Turns 10, HUFFINGTON POST, (Jan. 10, 2012, 4:21 PM),
http://www.huffingtonpost.com/2012/01/10/guantanamo-closure-anniversary_n_1195
984.html.
5. See Class Action Complaint at ¶¶ 56–61, Tasini v. AOL, Inc., 851 F. Supp. 2d 734
(S.D.N.Y. 2011) (No. 11 Civ. 2472(JGK)), 2011 WL 1366476 (alleging that the Huffington
Post recruited professional journalists and authors to generate high quality content without
compensation).
6. See Nate Silver, The Economics of Blogging and the Huffington Post, N.Y. TIMES (Feb.
12, 2011, 12:28 PM), http://fivethirtyeight.blogs.nytimes.com/2011/02/12/the-
economics-of-blogging-and-the-huffington-post/ (estimating fifteen million page hits per
weekday on HuffPo and analyzing the types of posts and attention the site was typically at-
tracting).
7. Id.; see also Julianne Pepitone, Huffington Post Blogger Sues AOL for $105 Million,
CNN MONEY (Apr. 12, 2011, 2:58 PM), http://money.cnn.com/2011/04/12/technology/
huffington_post_blogger_lawsuit/index.htm (noting that AOL had acquired Huffington
Post for $315 million).
8. See Jeremy W. Peters & Verne G. Kopytoff, Betting on News, AOL is Acquiring Huff-
ington Post, N.Y. TIMES, Feb. 7, 2011, at A1 (describing AOL’s reasons for purchasing the
Huffington Post, including its desire for more news content and a broader audience).
2013] CYBER COMMODIFICATION 383
9
stood to make a handsome profit from the acquisition. The blog-
gers, on the other hand, who had built the blog’s readership by dint
10
of their hard work, were to receive nothing. Frustrated, Jonathan
11
Tasini, a journalist and labor activist, along with other unpaid blog-
12
gers, filed a lawsuit challenging the terms of the deal. The bloggers
claimed that their hard work had built the blog’s value, entitling them
to a share of the profits by virtue of a contract claim or a claim for un-
13
just enrichment and restitution.
The heart of the Huffington Post bloggers’ claims seemed to rest,
as many contract-related disputes do, in the differing expectations
that the parties brought with them to the deal. From the bloggers’
perspective, they performed work without payment because they be-
lieved that they were contributing to a political website that advanced
14
the causes in which they believed. Retroactively, the bloggers
learned that the site’s founders were to profit from the blog, and they
15
therefore felt exploited. The Huffington Post contended that the
bloggers undertook their writing with no expectation of compensa-
16
tion. Further, they claimed that the bloggers did receive a substan-
9. See id. (“The sale means a huge payout for Huffington Post investors and holders of
its stock and options . . . .”).
10. See Class Action Complaint, supra note 5, at ¶ 3 (alleging that none of the profits
from AOL’s purchase of the Huffington Post were shared with its bloggers); see also Rutten,
supra note 6 (“To grasp its business model . . . you need to picture a galley rowed by slaves
and commanded by pirates.”).
11. Jonathan Tasini was previously the successful lead plaintiff in a lawsuit challenging
the rights of newspapers to license the work of freelance writers to electronic databases
without additional compensation. N.Y. Times Co. v. Tasini, 533 U.S. 483, 506 (2001).
12. Class Action Complaint, supra note 5, at ¶ 3.
13. Id. at ¶ 2. The claim would be that, although a formal contract was lacking, the
organizers of the Huffington Post were unjustly enriched and a restitution theory would be
applied to compensate the bloggers. Ashby Jones, Do Huffington Post Bloggers Deserve to Get
Paid?, WALL ST. J. LAW BLOG (Apr. 12, 2011, 4:01 PM),
http://blogs.wsj.com/digits/2011/04/12/should-huffington-post-bloggers-get-paid/.
14. See infra Part IV.
15. The unpaid bloggers posted on the Twitter account #huffpuff, claiming that Huff-
Po “‘built a blog-empire on the backs of thousands of citizen journalists.’” Silver, supra
note 6. Ironically, liberal ideology generally tends to support organized labor and work-
ers’ rights.
16. Memorandum of Law in Support of Defendants’ Rule 12(b)(6) Motion to Dismiss
the First Amended Complaint at 1, Tasini v. AOL, Inc., 851 F. Supp. 2d 734 (S.D.N.Y 2011)
(No. 11 Civ. 2472(JGK)), 2011 WL 8198300.
384 MARYLAND LAW REVIEW [Vol. 72:381
tial benefit, as they used the HuffPo “to connect and help their work
be seen by as many people as possible. It’s the same reason people go
17
on TV shows: to promote their views and ideas.” In other words, ac-
cording to the HuffPo, the blog provided unknown writers with an
important boon: a platform for expression and free publicity to a
18
growing audience. On March 30, 2012, the district court sided with
19
the HuffPo blog and dismissed the bloggers’ complaint. The deci-
sion was later affirmed on appeal by the United States Court of Ap-
20
peals for the Second Circuit.
While the Huffington Post dispute is a new context for examining
the monetization of Internet websites and online activities, the fact is
that this question—whether a website is or should be commercial-
ized—is becoming an increasingly common and vexing one. For the
past decade, technology has fundamentally shaped and restructured
21
the ways in which many markets function. Indeed, certain goods
and services, which in the past were off-limits because they would have
been impracticable to sell or difficult to buy, have been brought to
17. Jeremy W. Peters, Huffington Post Is Target of Suit on Behalf of Bloggers, N.Y. TIMES
(Apr. 12, 2011, 12:49 PM), http://mediadecoder.blogs.nytimes.com/2011/04/12
/huffington-post-is-target-of-suit-on-behalf-of-bloggers/.
18. Id. For academic commentary discussing the rise of amateurism and peer produc-
tion of blogs, see John Quiggen & Dan Hunter, Money Ruins Everything, 30 HASTINGS
COMM. & ENT. L.J. 203, 220 (2008).
19. Tasini v. AOL, Inc., 851 F. Supp. 2d 734, 745 (S.D.N.Y. 2012), aff’d, No. 12–1428–
CV, 2012 WL 6176559, at *1 (2d Cir. Dec. 12, 2012).
20. Tasini v. AOL, Inc., No. 12–1428–CV, 2012 WL 6176559, at *1 (2d Cir. Dec. 12,
2012).
21. For example, computerized trades have replaced the loud, frantic atmosphere of
the “trading pit” where stockbrokers traditionally executed buy-sell orders. See Graham
Bowley, The New Speed of Money, Reshaping Markets, N.Y. TIMES, Jan. 1, 2011, at BU1 (noting
that most stock trading in the United States is conducted via computer); Michael J. De La
Merced & Jack Ewing, A German Bid to Take over the Big Board, N.Y. TIMES, Feb. 10, 2011, at
A1 (“[I]ncreasingly trades are being executed by computers far from Wall Street.”); see also
Margaret Jane Radin, Property Evolving in Cyberspace, 5 J.L. & COM. 509, 509 (1996) (noting,
presciently, that “the way we think about property is changing in light of the technological
and social realities of the global flow of digital information over linked computer net-
works”); M. Ryan Calo, People Can Be So Fake: A New Dimension to Privacy and Technology
Scholarship, 114 PENN ST. L. REV. 809, 850–52 (2010) (describing psychological literature
on how humans are interacting with robotic devices, such as global mapping programs
and Roomba housekeepers).
2013] CYBER COMMODIFICATION 385
22 23
market by intermediaries such as eBay, Amazon.com, and
24 25
craigslist, as these platforms have either minimized or removed var-
26
ious transaction costs. Further, items that have traditionally been
27
seen as non-monetizable, such as predictions about future events,
22. EBAY, http://www.ebay.com (last visited Sept. 11, 2012). As one of the first online
auction websites, eBay has certainly had its share of commodification controversies. In
1999, the attempted auction of a human kidney on eBay created a furor and spurred fur-
ther debate surrounding markets in human organs. Amy Harmon, Auction for a Kidney
Pops up on eBay’s Site, N.Y. TIMES, Sept. 3, 1999, at A13. Citing federal law criminalizing or-
gan sales, eBay removed the auction but not before bids had reached several million dol-
lars. See id. (noting that the National Organ Transplant Act, 42 U.S.C. § 274e (2006), crim-
inalizes the sale of human organs). Since that time, eBay has attracted more than its share
of nontraditional sale items, including “holy toast,” a grilled cheese sandwich with a grill
pattern that reflected the likeness of the Virgin Mary, occult items, and even people put-
ting themselves up for sale. $28,000 Bid Wins Sandwich, CHI. TRIB., Nov. 23, 2004, at C18;
Mary Ann Georgantopoulos, Student’s eBay Stint Pays the Bills, Makes a Friend, BOS. GLOBE,
Aug. 12, 2007, at 4 (describing a vacationing student who sold himself—or at least one
week of his labor—to pay for an airline ticket back to the United States). Which goods
and services are considered legitimately for sale, which are jokes, and which are banned is
a seemingly delicate and ever-shifting line implicating issues of public policy, morality, and
the doctrines of common law contracts. As new markets form and transaction costs con-
tinue to fall, the boundaries between market and non-market activity are prone to in-
creased slippage. So while it is legally acceptable for one to sell the space on one’s fore-
head to sport a tattoo with the name of a corporation, the literal sale of one’s soul is
forbidden on Internet auction sites. Compare, Andrew Adam Newman, The Body as Bill-
board: Your Ad Here, N.Y. TIMES, Feb. 17, 2009, at B3 (noting the legal business of tattoo
advertising), with Soul Seller, CHI. TRIB., June 14, 2004, at 49 (describing auction for a soul
that slipped past eBay’s rules; the price of a soul in that auction was a mere $400).
23. AMAZON, http://www.amazon.com (last visited Sept. 11, 2012).
24. CRAIGSLIST, http://www.craigslist.org (last visited Sept. 11, 2012).
25. I use this term throughout the article even though it has many meanings, includ-
ing a technical platform, a platform from which to speak, or, in the words of one commen-
tator, platforms as the “curators of public discourse.” See Tarleton Gillespie, The Politics of
‘Platforms’, NEW MEDIA & SOC’Y (2010) (discussing the use of the term “platform”); Niva
Elkin-Koren, User-Generated Platforms, in WORKING WITHIN THE BOUNDARIES OF
INTELLECTUAL PROPERTY (Rochelle Dreyfuss et al. eds., 2010), available at http://ssrn.com
/abstract=1648465 (discussing social media platforms).
26. See infra Part II.B.
27. See generally MICHAEL ABRAMOWICZ, PREDICTOCRACY (Yale Univ. Press 2008) (de-
scribing the benefits of prediction markets). For the author’s discussion prediction mar-
kets, see generally Miriam A. Cherry & Robert L. Rogers, Prediction Markets and the First
386 MARYLAND LAW REVIEW [Vol. 72:381
28
tasks performed in minutes or even seconds of leisure time, or the
29
friendship and connections that comprise social capital, are all now
30
rapidly in the process of being valued, monetized, globalized, and
marketed online. At times these shifting boundaries have resulted in
31
legal disputes.
When it comes to commodification on the Internet, it is a wild,
wild World Wide Web. Researching encyclopedia articles for Wikipe-
dia is an unpaid labor of love, but connecting to your friends on Fa-
32
cebook is a $100 billion enterprise. Newspaper classified advertise-
ments are definitely commercial, but their equivalent on craigslist was
mostly non-commercial—until the Delaware Chancery Court stepped
33
in. Selling your organs is prohibited in the United States, whereas
34
selling hair promises to rescue third-world citizens from poverty.
Selling sex is illegal as prostitution, but selling adultery online is a hot
35
new business model. And a small company offering a free service to
academics has quietly become the dominant method for disseminat-
ing academic legal research, beating massive commercial data provid-
36
ers without anyone initially noticing. This Article will explore these
and other recent developments to explore the challenging legal issues
raised by Internet commodification of what is often unpaid labor.
The new technology that has given rise to these unconventional
markets raises provocative legal and theoretical questions. Funda-
Amendment, 2008 U. ILL. L. REV. 833 (2008) [hereinafter Cherry & Rogers, Prediction Mar-
kets] (discussing the legal issues surrounding prediction markets); Miriam A. Cherry &
Robert L. Rogers, Tiresias and the Justices: Using Information Markets to Predict Supreme Court
Decisions, 100 NW. U. L. REV. 1141 (2006) (discussing the application of prediction markets
to Supreme Court decisions); Miriam A. Cherry & Robert L. Rogers, Markets for Markets:
Origins and Subjects of Information Markets, 58 RUTGERS L. REV. 339 (2006) (analyzing the
history and evolution of prediction markets).
28. Randall Stross, When the Assembly Line Moves Online, N.Y. TIMES, Oct. 31, 2010, at 5.
29. See infra Part III.B.
30. See, e.g., Miriam A. Cherry, The Global Dimensions of Virtual Work, 54 ST. LOUIS U.
L.J. 471, 472–73 (2010) [hereinafter Cherry, Virtual Work] (noting the increasing trend
toward globalization in online work).
31. See infra Part IV.
32. See infra Part III.B.
33. See infra Part III.A.
34. See infra Part I.
35. See infra Part II.A.2.
36. See infra Part IV.B.
2013] CYBER COMMODIFICATION 387
60. Alex Tabarrok, The Meat Market, WALL ST. J., Jan. 8, 2010, at A1; Claire Suddath &
Alex Altman, How Does Kidney-Trafficking Work?, TIME (July 27, 2009), http://www.time.
com/time/health/article/0,8599,1912880,00.html.
61. See Miriam A. Cherry, A Tyrannosaurus-Rex Aptly Named “Sue”: Using a Disputed Dino-
saur to Teach Contract Defenses, 81 N.D. L. REV. 295, 295–97 (2005) (describing lightly regu-
lated fossil markets in the United States).
62. U.S. CONST. amend. XIII (banning the institution of slavery); Mario L. Barnes &
Erwin Chemerinsky, The Once and Future Equal Protection Doctrine?, 43 CONN. L. REV. 1059,
1067 (2011).
63. See Joel Seligman, The Changing Nature of Federal Regulation, 6 WASH. U. J.L. & POL’Y
205, 207–10 (2001) (discussing statutes enacted to create a national system of securities
regulation).
64. See Radin, supra note 51, at 1855–59 (discussing the concept of inalienability).
392 MARYLAND LAW REVIEW [Vol. 72:381
65. See, e.g., Gary Fields & John R. Emshwiller, Federal Offenses: As Criminal Laws Prolif-
erate, More Ensnared, WALL ST. J., July 23, 2011, at A1 (describing a father and son who were
arrested for digging arrowheads on federal land).
66. U.S. CONST. amend. XVIII (instituting prohibition along with the Volstead Act),
repealed by U.S. CONST. amend. XXI; see also Lloyd C. Anderson, Direct Shipment of Wine, the
Commerce Clause and the Twenty-First Amendment: A Call for Legislative Reform, 37 AKRON L.
REV. 1 (2004) (discussing the impact on the shipment of wine as a result of the Twenty-
First Amendment of the U.S. Constitution); Susan Lorde Martin, Wine Wars—Direct Ship-
ment of Wine: The Twenty-First Amendment, The Commerce Clause, and Consumers’ Rights, 38 AM.
BUS. L. J. 1 (2000) (same).
67. See, e.g., Steven Wisotsky, Exposing the War on Cocaine: The Futility and Destructiveness
of Prohibition, 1983 WIS. L. REV. 1305, 1310–13 (describing the criminalization of cocaine in
the United States).
68. See, e.g., Michael Berkey, Mary Jane’s New Dance: The Medical Marijuana Legal Tango,
9 CARDOZO PUB. L. POL’Y & ETHICS J. 417, 428–31 (2011).
69. Andrew Gilden, Sexual (Re)consideration: Adult Entertainment Contracts and the Problem
of Enforceability, 97 GEO. L.J. 541, 553 (2007). Anti-prostitution laws criminalize the pay-
ment of money for sexual services. This rule, however, is also context-dependent and pro-
duces odd results in its application at times. While payment for sexual services is banned
in prostitution, producers of pornography legally pay performers for their appearance in
sexually explicit films, which include payment for sexual services. See Taylor v. State, 808
P.2d 314 (Ariz. Ct. App. 1990) (introducing this legal distinction). Recently, Professor
SpearIt has argued that the justification for the distinction between prostitution and por-
nography is a flimsy one, since both constitute the commodification of sexual services. As
such, the criminalization of prostitution treats those in like situations unequally, in fact
criminalizing the activity for those of lower socio-economic class. SpearIt, Assistant Profes-
sor of Law, Saint Louis University School of Law, Presentation at the Saint Louis University
School of Law: Vice-versa: Reframing, Reforming, Pornography Through Prostitution Law
(July 20, 2011).
2013] CYBER COMMODIFICATION 393
70. Cherry & Rogers, Prediction Markets, supra note 27, at 834–35.
71. See, e.g., Lawrence A. Cunningham, The Sarbanes-Oxley Yawn: Heavy Rhetoric, Light
Reform (And It Just Might Work), 35 CONN. L. REV. 915, 919–20 (2003) (listing all of the
groups subject to regulation by the Sarbanes-Oxley Act).
72. Id. at 969–70. Indeed, one commentator has noted that certain provisions of the
Sarbanes-Oxley Act inscribed into law the “best practices” that existed at the time. Id. at
918.
73. Magnuson-Moss Warranty—FTC Improvement Act, Pub. L. No. 93-637, § 106(b),
88 Stat. 2183, 2188–89 (1974) (codified as amended at 15 U.S.C. § 2306 (2006)).
74. Securities and Exchange Act, 15 U.S.C. § 77c (2006); see also In re Integrated Res.
Real Estate Ltd. P’ships Sec. Litig., 815 F. Supp. 620, 628 (S.D.N.Y. 1993) (noting that the
purpose of the Securities and Exchange Act in exempting those who qualify as accredited
investors is to facilitate specially designed offerings while also protecting against the dan-
ger posed by the lack of SEC scrutiny of offer and sale).
75. OLIVER WENDELL HOLMES, THE COMMON LAW 230 (Mark DeWolfe Howe ed.,
Belknap Press of Harvard Univ. Press 1963) (1881).
76. See Hamer v. Sidway, 27 N.E. 256, 256 (N.Y. 1891) (involving a nephew’s promise
to refrain from vices).
77. See Johnson v. Otterbein Univ., 41 Ohio St. 527, 530 (Ohio 1885) (analyzing con-
sideration in the context of a charitable gift).
394 MARYLAND LAW REVIEW [Vol. 72:381
78
While not often litigated, the doctrine of consideration performs an
important policing function in terms of decisions about what kinds of
trades will be enforceable and thus legitimately part of a market
economy, and what trades are unenforceable. Public policy is anoth-
79
er ill-defined doctrine but it too has formed the basis for striking
80
down particular private bargains. From this broad legal overview, I
turn now to a literature review of commodification theory.
surrounding markets for human organs have also sparked serious de-
86
bate.
Feminist theorists have been at the forefront of this commodifi-
cation discussion, perhaps because some of these markets have gen-
der implications, concern the body, or concern women’s traditional
roles, which were historically outside and apart from paid labor mar-
87
kets. Many of these theorists were concerned with the dignitary as-
pects of these trades and argued that women’s bodies and reproduc-
tive capacities should not be the subject of trade or market pressures.
Other feminists were concerned about the exploitation of poor wom-
en by the wealthy, sometimes based on racial lines or the develop-
ment status of the countries in which women lived. Some were con-
cerned that the monetization of reproductive capacity could only lead
to further exploitation.
Although there are a number of conflicting discussions and as-
sumptions surrounding the development of commodification of the
body, opponents of commodification in these areas voice arguments
that touch on two general areas of concern. First, some are con-
cerned that markets can be coercive and play on the desperation that
88
arises from abject poverty and economic inequality. Second, oppo-
nents argue that commodification will corrupt basic human values,
meaning that “certain moral and civic goods are diminished or cor-
89
rupted if bought and sold for money.” In other words, particular
markets might impair the value of human life and, perhaps, dignity.
While the first argument looks to the ideal of consent, the dignity ar-
gument examines the type of goods offered and questions whether
ally Kimberly D. Krawiec, Altruism and Intermediation in the Market for Babies, 66 WASH. & LEE
L. REV. 203 (2009) (collecting sources).
86. See Roth, supra note 55, at 45–50 (discussing issues surrounding the compensation
of organ donors); see also Emily C. Lee, Trading Kidneys for Prison Time: When Two Contradic-
tory Legal Traditions Intersect, Which One has the Right-of-Way?, 43 U.S.F. L. REV. 507, 508 &
n.10 (2009) (describing a proposed bill in South Carolina that would have provided good
time credit for prisoners who became kidney donors (citing S.B. 480, 117th Gen. Assemb.,
Reg. Sess. (S.C. 2007))).
87. See generally, RETHINKING COMMODIFICATION (Martha M. Ertman & Joan C. Wil-
liams eds., 2005) (addressing commodification in a feminist context).
88. Michael J. Sandel, What Money Can’t Buy, The Moral Limits of Markets, in
RETHINKING COMMODIFICATION, supra note 87, at 122.
89. Id.
396 MARYLAND LAW REVIEW [Vol. 72:381
the purchase and sale of those goods will produce good results for so-
90
ciety overall.
91
Other feminist theorists, including Professors Martha Ertman
92
and Katherine Silbaugh, have argued in favor of commodification
more generally, proposing that familial relations would be more equi-
table if they were to be viewed in monetized terms. Indeed, Professor
Kimberly Krawiec has advocated for the monetization of certain of
these taboo trades, arguing that legalization and monetization of the
sexual economy could lead to women’s empowerment and more full
93
participation in the market economy.
While these various arguments in favor or against commodifica-
tion of the body resound in arguments based on either equality or au-
tonomy, Professor Joan Williams notes that perhaps this is a false di-
94
chotomy. Rather than a fully market transaction or a wholly non-
commodified one, Williams suggests that all transactions fall on some
95
part of a continuum, which she terms “Differentiated Ties.” Some
amount of commodification of our private lives is inevitable, accord-
ing to Williams, and rather than focus on judging whether this is ap-
propriate or not, she asks several key questions. Williams exhorts us
to consider whether the end result of the commodification is liberat-
ing, who controls the process of marketing and receives the proceeds,
96
and whether the commodification advances or harms social ties.
While “Differentiated Ties” is an awkward terminology that does not
seem to capture fully Williams’s concept, the questions she poses are
important, and I return to these insights in the last portion of the Ar-
ticle.
How does the further development of Internet technology im-
pact some of these unconventional markets? What is marketable has
always been contextually and culturally dependent, and has been sub-
ject to change over time, apart from any changes in the technological
mechanisms for market exchange. But particular aspects of this new
technology have their own dynamic that seems to encourage com-
modification. Would even Landes and Posner have predicted an
97
online market for human hair?
In dealing with sales that concern the body, the Internet reduces
transaction costs. These reduced transaction costs can take the form
of an intermediary website acting as platform. The legitimacy and ac-
ceptability that such an intermediary conveys may encourage particu-
lar types of transactions to become commodified, and perhaps seem
more acceptable. To ask the converse question, how does the theory
surrounding the first generation of commodification analyses apply to
the questions of Internet commodification? Let us turn to some ex-
amples that illustrate the forces pushing toward cyber commodifica-
tion. I return to the theoretical matters when discussing the implica-
tions of cyber commodification in the last portion of the Article.
97. On BuyandSellHair.com, sellers can create listings for their hair, including color
and length. See Listings for Hair for Sale, BUYANDSELLHAIR.COM, http://buyandsellhair.com
/ad-category/hair-for-sale/ (last visited Mar. 2, 2012). While in developed countries this
may not be big business, in developing countries the sale of hair can forestall abject pov-
erty. For example, in Eastern Europe, some children sell their hair for $3.20 to buy food
and the hair is then sold in the United Kingdom and the United States for thousands of
dollars. See Eddie Fitzmaurice, Children Sell Their Hair for $3, SUN-HERALD, Feb. 22, 2004.
On the other end of the spectrum, many choose to make donations of their hair, through
organizations such as Locks of Love, to those who need it due to various illnesses or chem-
otherapy. Mission & Vision, LOCKS OF LOVE, http://www.locksoflove.org/mission.html
(last visited Mar. 2, 2012). Note that wigs are not covered by most health insurance plans,
as they are considered cosmetic.
398 MARYLAND LAW REVIEW [Vol. 72:381
A. Anonymity
Anonymity encourages the growth of cyber commodification.
According to a recent article, “[a]nonymity and pseudonymity are in-
trinsic to, and inseparable from, cyberspace because a computer
serves as the medium through which interaction is facilitated. . . .
[T]he identity of each individual is removed either completely or in
98
part.” The concepts of anonymity and deindividuation have been
used as frameworks to analyze the proliferation of various types of
99 100
conduct in cyberspace including defamation, software piracy,
101 102
gambling, and harassment and cyberbullying.
Numerous studies indicate that people behave differently when
103
they believe their identity is anonymous. The role anonymity plays
in a person’s decisionmaking, however, is subject to debate. One
98. Sameer Hinduja, Deindividuation and Internet Software Piracy, 11 CYBERPSYCHOL. &
BEHAV. 391, 392 (2008).
99. Diane Rowland, Griping, Bitching and Speaking Your Mind: Defamation and Free Expres-
sion on the Internet, 110 PENN ST. L. REV. 519, 530–32 (2006).
100. Hinduja, supra note 98, at 392.
101. Mark Griffiths et al., Internet Gambling: An Overview of Psychosocial Impacts, 10 UNLV
GAMING RES. & REV. J. 27, 30 (2006).
102. Warren Chik, Harassment Through the Digital Medium: A Cross-Jurisdictional Compara-
tive Analysis on the Law on Cyberstalking, 3 J. INT’L COM. L. & TECH. 13, 13–14 (2008); Dan-
ielle Keats Citron, Cyber Civil Rights, 89 B.U. L. REV. 61, 63–64 (2009); cf. Frank Pasquale,
Beyond Innovation and Competition: The Need for Qualified Transparency in Internet Intermediar-
ies, 104 NW. U. L. REV. 105, 113 (2010) (describing ways in which negative terms can be
searched).
103. See, e.g., Katherine S. Williams, On-Line Anonymity, Deindividuation and Freedom of
Expression and Privacy, 110 PENN ST. L. REV. 687, 691 (2006) [hereinafter Williams, On-Line
Anonymity] (citing GUSTAVE LE BON, THE CROWD: A STUDY OF THE POPULAR MIND (Trans-
action Publishers 1995) (1895)) (describing Le Bon’s theory about the actions of people
in crowds as an individual going on a “moral or ethical holiday” when “he or she is part of
a larger and different whole”); M.E. Kabay, Dir. Of Educ., Int’l Computer Sec. Ass’n,
Presentation at the Annual Conference of the European Institute for Computer Anti-Virus
Research: Anonymity and Pseudonymity in Cyberspace: Deindividuation, Incivility and
Lawlessness Versus Freedom and Privacy (Mar. 16, 1998), http://www.mekabay.com/
overviews/anonpseudo.pdf (citing Phillip G. Zimbardo, The Human Choice: Individuation,
Reason and Order Versus Deindividuation, Impulse, and Chaos, in NEBRASKA SYMPOSIUM ON
MOTIVATION (W.J. Arnold & D. Levine, eds., University of Nebraska Press (Lincoln) 1969)
(noting Zimbardo’s suggestion that anonymity is a contributing factor to antisocial behav-
ior).
2013] CYBER COMMODIFICATION 399
104
predominant theory within the psychological literature is deindi-
viduation, “or the state of alienation, reduced inhibition and lack of
self-awareness, which occurs when a personal sense of identity is over-
105
whelmed by that of the group.” Early research focused on an indi-
106
vidual losing self-awareness due to participation in a large group.
Even absent group membership, however, anonymity may be a con-
tributing factor to deindividuation because anonymity results in a lack
107
of self-awareness. This resulting lack of self-awareness can lead to
108
disinhibited or anti-normative behavior. For example, from the rel-
109
ative anonymity of a car, a driver is more likely to drive aggressively,
a participant in an experiment is more likely to deliver a higher volt-
110
age of electric shock to his co-participant if his face is concealed,
and anonymous students are more likely to write cruel comments
111
about instructors in their teaching evaluations.
Evidence supporting a causal link between anonymity and certain
behavior on the Internet is lacking, but several otherwise important
about anywhere, anytime”); Glenn R. Stutzky, Cyber Bullying Information, INST. FOR PUB.
POLICY AND SOC. RESEARCH, http://www.ippsr.msu.edu/Documents/Forums/2006
_Mar_CYBER_BULLYING_INFORMATION_2006%20—%20Provided%20by%20Mr.
%20Glenn%20Stutzky.pdf (last visited Sep. 29, 2011) (noting that cyberbullying is “not
bound by time or geography”); Waldman, supra note 117, at 711-15 (defining and distin-
guishing cyberbullying and cyberattacking).
119. Franek, supra note 118.
120. Dickerson, supra note 117, at 56.
121. See Lior Jacob Strahilevitz, “How’s My Driving?” For Everyone (and Everything?), 81
N.Y.U. L. REV. 1699, 1703 (2006) (discussing eBay’s reputation system as a successful
means of ensuring the reliability of sales in the online marketplace).
122. Seller Performance Standards, EBAY, http://pages.ebay.com/help/policies/seller-
non-performance.html (last visited Mar. 2, 2012).
402 MARYLAND LAW REVIEW [Vol. 72:381
123. Indeed, pornography does a brisk online business. In 2006, for example, Internet-
based porn sales reached $2.8 billion. Jon Swartz, Purveyors of Porn Scramble to Keep up with
Internet, USA TODAY, June 12, 2007, at 4B.
124. ASHLEY MADISON, http://www.ashleymadison.com/ (last visited Mar. 2, 2012).
2013] CYBER COMMODIFICATION 403
125
those who are married. In the United States, the user demographic
of the website is heavily male; but in Australia, where prostitution is
legal, and married men often patronize prostitutes, married women
126
often avail themselves of the website. Before the advent of the In-
ternet, those who were seeking to have an extra-marital affair could
not trumpet their desires; a personal advertisement in a newspaper
could lead to discovery by a spouse. The Ashley Madison website,
therefore, thrives on promoting a sense of anonymity in its users’ af-
fairs.
While posting a profile on the Ashley Madison website is free,
127
contacting other members requires payment. Users can look at
other member’s profiles and “test the waters,” but if they want to initi-
128
ate contact, they have to purchase access. Credit card charges show
up under the name of an innocuous sounding business, so as not to
alert a suspicious spouse that money is being spent on a dating web-
129
site. Customers can also pay using other means, such as a money
order, electronic funds transfer from their bank, or pre-paid gift
130
card. These alternate methods of payment help a customer keep
his or her use of the website hidden from a partner or spouse.
Ashley Madison’s business model depends on promoting a sense
of anonymity among its users; the website therefore strongly promotes
the concept of privacy and anonymity as a key selling point for its cus-
tomers. The home page for the website features a woman holding
131
her finger over her lips, illustrating the privacy the website offers.
The tagline under the website reads, “The world’s leading married
dating service for discreet encounters,” with the word discreet empha-
132
sized. A Time article discussed the latest marketing tactic used by
133
Ashley Madison and other similar websites: mobile cheating. The
125. See id. (“Ashley Madison is the world’s leading married dating service for discreet
encounters.”).
126. Adulterers Only, SYDNEY MORNING HERALD, Aug. 18, 2012, at 20.
127. Frequently Asked Questions, ASHLEY MADISON, supra note 124.
128. Id.
129. Adulterers Only, supra note 126.
130. Information on payment methods is available to male users who create a profile at
ASHLEY MADISON, supra note 124.
131. Id.
132. Id.
133. Jeremy Caplan, Cheating 2.0: New Mobile Apps Make Adultery Easier, TIME, June 29,
2009, available at http://www.time.com/time/magazine/article/0,9171,1909602,00.html.
404 MARYLAND LAW REVIEW [Vol. 72:381
134. Id.
135. What’s in a Name? Four Thousand and Fifty Dollars, FREAKONOMICS.COM (Jan. 13,
2009, 9:40 AM), http://www.freakonomics.com/2009/01/21/whats-in-a-name-four-
thousand-and-fifty-dollars/?scp=1&sq=baby+naming+rights&st=nyt; Matthew Purdy, Our
Towns; A Boy Named Soup?, N.Y. TIMES, Aug. 1, 2001, at B1; Joshua Rhett Miller, Woman
Blames eBay for Thwarting Baby Name Auction, FOX NEWS (Aug. 13, 2009),
http://www.foxnews.com/story/0,2933,539311,00.html.
136. 85 Ind. 294 (1882).
137. Id. at 303–04.
138. Id. at 294–95.
139. Id. at 308.
140. Id. at 303–04.
2013] CYBER COMMODIFICATION 405
investigation to analyze “the effectiveness of Title VII as a remedy for and deterrent to race
discrimination in the hiring market”).
149. Gardner, 105 N.E. at 360.
150. Id.
151. Purdy, supra note 135.
152. Don Oldenburg, Ringing Up Baby; Companies Yawned at Child Naming Rights, but Was
It an Idea Ahead of Its Time?, WASH. POST, Sept. 11, 2001, at C10; Matthew Kauffman, New-
born Naming Game: No Takers, HARTFORD COURANT, Aug. 15, 2001.
153. Aaron Falk, Mom Sells Face Space for Tattoo Advertisement, DESERET NEWS (June 30,
2005), http://www.deseretnews.com/article/600145187/Mom-sells-face-space-for-tattoo-
advertisement.html.
2013] CYBER COMMODIFICATION 407
and the lack of clear jurisdictional legal boundaries. In short, the In-
ternet lowers transaction costs dramatically, and this propels the forc-
es of commodification. The two clearest illustrations of these forces
are virtual work and crowdfunding.
1. Virtual Work
As Internet and computer technology becomes increasingly
ubiquitous and less expensive, these developments have forged new
ways to buy and sell not only objects, but also labor and time. In a
previous article, I described this phenomena, which I have termed
154
“virtual work,” but which has also been alternately described as “la-
155
bor as a service,” “peer production,” or “playbor.” As noted by Ran-
dall Stross in the New York Times, crowdsourcing technology has ena-
bled the slicing of labor into small increments, micro-tasks that break
156
down a large job into its lowest common denominator. After the
tasks are farmed out to individual workers, they are then re-
aggregated and the overall job is completed. This is the process
157
known as crowdsourcing.
In fact, millions of people worldwide entertain themselves or
supplement their incomes—or both—by working within virtual worlds
such as Second Life or casually “clicking” to make a few dollars for
158
simple tasks on websites like Amazon.com’s Mechanical Turk. Be-
159. See CASTRONOVA, supra note 158, at 2 (noting that annual exchange of virtual
money and goods are estimated at $30 million in the United States, and $100 million
globally).
160. Id. at 19.
161. Michael Risch, Virtual Rule of Law, 112 W. VA. L. REV. 1, 6 (2009) (footnotes omit-
ted); see also Michael Capiro, Virtual Worlds with Real-World Losses, 56 FED. LAW. 12 (2009)
(reporting estimate from investment banking firm Piper Jaffray that virtual sales of goods
were estimated to be $621 million in 2009 and were expected to grow to nearly $2.5 billion
by 2013); Andrea Vanina Arias, Life, Liberty, and the Pursuit of Swords and Armor: Regulating
the Theft of Virtual Goods, 57 EMORY L.J. 1301, 1302 (2008) (citing sources estimating that
trade in virtual goods amounts from approximately $200 million to $2 billion a year);
Theodore P. Seto, When Is a Game Only a Game? The Taxation of Virtual Worlds, 77 U. CIN. L.
REV. 1027 (2009). Professor Seto notes that Ailin Graef,
a Chinese-born citizen and resident of Germany, had parlayed an initial invest-
ment of $9.95 into virtual planned communities and other virtual holdings hav-
ing a real-world fair market value, in the aggregate, of more than one million
U.S. dollars. In theory, Graef could have pulled her Second Life earnings out at
any time; at some point, she did in fact withdraw enough to found an eighty-
employee real-world company.
Id. at 1027 (footnote omitted).
2013] CYBER COMMODIFICATION 409
162
virtual worlds such as Second Life. In the wake of the economic
downturn, websites such as ELance, which serve to connect compa-
nies seeking short term help with workers willing to take on short
163
term assignments, have been doing brisk business. Throughout cy-
berspace, workers hold various jobs that, in the words of leading
commentators, make it possible to “work in a fantasy world to pay rent
164
in reality.”
Recently, Professor Jonathan Zittrain noted that the advent of
virtual work simultaneously provides immense promise and peril for
165
workers in the new digital economy. New technology allowing col-
laboration can provide remarkable opportunities for workers and
employers alike. Traditional limitations on collaboration—of travel,
of meeting, of commuting—can be minimized or reduced. Employ-
162. Manpower and Randstad have advertisements posted on YouTube touting their
recruiting services in Second Life. See, e.g., Virtual Jobs at Ranstad, YOUTUBE (Apr. 12,
2007), http://www.youtube.com/watch?v=k5xF43POYv8&feature=PlayList&p=7B20448AB
A3A94B8&playnext=1&playnext_from=PL&index=43; Manpower’s Machinima on the World of
Virtual Work, YouTube (July 12, 2007), http://www.youtube.com/watch?v=sNjxucDI8bo.
163. See Ann Meyer, Fewer Strings a Draw for Employers: Virtual Contract Workers, Internet
Tools Help Firms Grow, Afford to Add Talent, CHI. TRIB., Nov. 23, 2009, at 19 (noting that
“[y]ear-over-year project hiring on Elance rose 40 percent in October, and more than
300,000 jobs have been posted on the Web site during the past 12 months”); cf. Emma L.
Carew, Tough Times Lead many into Virtual Work World, STAR-LEDGER, July 12, 2009, at 6
(noting that that the poor economy has pushed many employers into hiring virtual office
assistants).
164. F. Gregory Lastowka & Dan Hunter, The Laws of the Virtual Worlds, 92 CALIF. L. REV.
1, 11 (2004).
165. Jonathan Zittrain, Work the New Digital Sweatshops, NEWSWEEK, Dec. 7, 2009. Ac-
cording to Professor Zittrain:
It all sounds great, and in many ways it is. The Internet has created new markets
for human labor potentially gleaned anywhere in the world . . . . [But] online
contracting circumvents a range of labor laws and practices, found in most de-
veloped countries, that govern worker protections, minimum wage, health and
retirement benefits, child labor, and so forth.
Id.; see also Robert D. Hof, The End of Work as You Know It, BUS. WK., Aug. 19, 2007, at 80.
Hof asks:
Will this be a new world of empowered individuals encased in a bubble of time-
saving technologies? Or will it be a brave new world of virtual sweatshops, where
all but a tech-savvy few are relegated to an always-on world in which keystrokes,
contacts, and purchases are tracked and fed into the faceless corporate maw?
Id.
410 MARYLAND LAW REVIEW [Vol. 72:381
ers can use virtual spaces to make contacts and recruit talent, without
166
spending money on transportation. Certainly, the possibility of
matching workers and jobs in cyberspace creates more opportunities
167
and more efficient labor markets. These changes can benefit work-
ers, in part by increasing flexibility and allowing workers more control
168
over when and how they are able to perform work. In addition,
employees have used virtual worlds as part of their protected right to
169
organize and protest. For example, in September 2007, over 2,000
employees protested IBM Italy’s pay package by appearing at IBM’s
170
headquarters in Second Life.
Virtual work, however, presents many of the same enduring prob-
lems that workers’ rights advocates have struggled with over the years.
171
Gold farming operations and other types of virtual work have been
172
criticized by commentators as creating new “virtual sweatshops.”
For years corporations have engaged in races to the bottom, not only
in selecting the jurisdiction of incorporation that will govern their in-
166. See, e.g., Joel Dresang, Manpower Opens Office in Online Virtual Society, MILWAUKEE J.
SENTINEL, July 13, 2007, at D1 (noting that the Manpower recruiting agency opened an
office within Second Life); Gabrielle Monaghan, A Virtual Way to Find Real Talent, SUNDAY
TIMES, March 16, 2008, at 19 (describing KPMG and Accenture recruiting events on Sec-
ond Life).
167. See Kermit Pattison, How to Enlist a Global Work Force of Freelancers, N.Y. TIMES (June
25, 2009), http://www.nytimes.com/2009/06/25/business/smallbusiness/25freelance.
html?fta=y (noting ways in which working with freelancers can increase productivity); cf.
ALAN HYDE, WORKING IN SILICON VALLEY: ECONOMIC AND LEGAL ANALYSIS OF A HIGH-
VELOCITY LABOR MARKET (2003).
168. Carol Sladek & Ellie Hollander, Where is Everyone? The Rise of Workplace Flexibility, 25
BENEFITS Q. 17, 17–18 (2009) (noting that flexibility is “being able to be at Little League at
3:30 in the afternoon, with the ability to catch up on work after dinner with the family.
Flexibility is a way for the employer to acknowledge and enable the whole person.”).
169. See 29 U.S.C. §§ 151–169 (2006) (federal laws regarding the rights of workers to
organize and protest).
170. On Strike, Virtually, ECONOMIST, March 13, 2008, at 87.
171. For a definition of “gold farming,” see infra note 191 and accompanying text.
172. See David Barboza, Ogre to Slay? Outsource it to Chinese, N.Y. TIMES, Dec. 9, 2005, at
A1 (explaining how gold farming works); cf. Wendy N. Duong, Ghetto’ing Workers with Hi-
Tech: Exploring Regulatory Solutions for the Effect of Artificial Intelligence On “Third World” Foreign
Direct Investment, 22 TEMPLE INT’L & COMP. L.J. 63 (2008) (discussing the impact of virtual
work in developing countries).
2013] CYBER COMMODIFICATION 411
173
ternal corporate affairs, but also to find the jurisdictions with the
cheapest labor and the least regulation of employment relation-
174
ships. The concern about virtual work is that it will lead to further
acceleration of the race to the bottom and ultimately the further ero-
175
sion of worker’s rights and benefits.
In a popular press article, Professor Zittrain set out a useful ty-
pology of crowdsourcing based on the level of knowledge required to
176
complete a given work task. In the level requiring the most skill,
companies post difficult scientific problems and promise a reward for
177
the answer. For example, on the Innocentive website, 178 highly
skilled scientists try to solve complicated problems to reap financial
prizes. In the middle skill level, some websites rate and grade workers
at various tasks to ensure quality control for routine backroom opera-
179
tions, such as that performed by customer service representatives.
180
For example, on LiveOps, telephone calls are routed to individual
customer service workers on their cell phones. Finally, at the lowest
end, there is work that encompasses tasks that require only minimal
awareness, such as the entry of a few characters or the clicking of a
173. See, e.g., Brett H. McDonnell, Getting Stuck Between Bottom and Top: State Competition
for Corporate Charters in the Presence of Network Effects, 31 HOFSTRA L. REV. 681, 683–89 (2003)
(describing the process of choosing a jurisdiction of incorporation).
174. See, e.g., Archie A. Alexander III, American Diagnostic Radiology Moves Offshore: Is This
Field Riding the “Internet Wave” into a Regulatory Abyss?, 20 J.L. & HEALTH 199, 199–205
(2006/2007) (analyzing outsourcing of medical services); Christina Laun, The Central Amer-
ican Free Trade Agreement and the Decline of U.S. Manufacturing, 17 IND. INT’L & COMP. L. REV.
431, 431–32 (2007) (considering the impact of Central American Free Trade Agreement
on U.S. manufacturing industries); Raul Delgado Wise & James M. Cypher, The Strategic
Role of Mexican Labor under NAFTA: Critical Perspectives on Current Economic Integration, 610
ANNALS 120, 120–22 (2007) (discussing the impact of the North American Free Trade
Agreement on outsourcing); Keith Woffinden, Surfing the Next Wave of Outsourcing: The Eth-
ics of Sending Domestic Legal Work to Foreign Countries Under New York City Opinion 2006-3,
2007 BYU L. REV. 483, 483–86 (2007) (discussing the legal and ethical implications of out-
sourcing legal work).
175. Katherine Van Wezel Stone, To The Yukon and Beyond: Local Laborers in A Global
Market, 3 J. SMALL & EMERGING BUS. L. 93, 95–104 (1999) (describing the race to the bot-
tom phenomenon within global labor markets).
176. Zittrain, supra note 165.
177. Id.
178. INNOCENTIVE, http://www.innocentive.com (last visited Mar. 2, 2012).
179. Zittrain, supra note 165.
180. LIVEOPS, http://www.liveops.com (last visited Mar. 2, 2012).
412 MARYLAND LAW REVIEW [Vol. 72:381
181
mouse in a second or two. Regardless of the level of skill involved,
crowdsourcing takes the products of many workers to create some-
182
thing greater than the sum of its parts.
Crowdsourcing and other types of distributed work are likely to
increase in frequency in the years to come. While Amazon’s Mechan-
ical Turk was once synonymous with crowdsourcing, there are now
many more websites that promise to help users harness the power of
183
the crowd. The tasks that can be assigned through crowdsourcing
184
are virtually limitless. Other websites work subtly, sometimes with-
out the knowledge of the user. For example, to prevent websites and
blogs from being swamped with “spam” from automated comment
185
generators, many sites require users to enter a word. The reCAP-
TCHA software uses this anti-spam device to digitize books and news-
186
papers by aggregating them one word at a time. In another twist,
some websites are using fun games to entice users to work for them.
For example, one website presents players with puzzles, the answers to
187
which help scientists determine how proteins fold. Crowdsourcing
has been used to check surveillance cameras at the United States-
Mexico border to look for aliens, and to use computers to help SETI
188
in its search for a different type of alien.
Other forms of virtual work blur the line between work and lei-
sure. A number of China’s new “factories” feature computer workers,
typing and clicking away, playing video games, collecting coins and
189
swords, and fighting monsters. Known as “gold farmers,” these
workers are paid to harvest virtual treasures for online gamers in the
190
developed world. These affluent gamers want to advance quickly
within the game and, tired of the repetitive tasks necessary to build a
191
high-level character, would prefer to pay others to do the work. As
a result, gold farming operations have appeared in many developing
192
countries, where labor costs are low. For example, a company
named Blacksnow opened operations in Tijuana, Mexico, paying
Mexican nationals dollars a day to kill dragons and obtain objects in
193
Mythic Entertainment’s online Camelot game. Acting as an inter-
194
mediary, Blacksnow later resold these virtual objects on eBay and
other online exchange sites to high bidders in developed countries,
195
thereby taking advantage of lower labor costs in developing nations.
190. Id.
191. According to another recent article on Chinese gold farmers, there are now three
models for reaping the bounty of the virtual world. In the traditional, more typical model
which is the one described above, the gold farmers use their experienced characters in
order to perform repetitious tasks, garner valuables, and then, through intermediaries, sell
the virtual property in exchange for cash. In the second model, called “power leveling,” a
wealthy player will pay the gold farmers to play his character twenty-four hours a day, al-
lowing the character to become vastly powerful in a short period. Finally, the third model
involves assembling a team of Chinese players who guide the player to the highest levels
and then let the player receive the most valuable objects (which cannot be sold). See Julian
Dibbell, The Life of a Chinese Gold Farmer, N.Y. TIMES MAG., June 17, 2007, at 36.
192. Id.
193. When Mythic Entertainment attempted to shut down Blacksnow’s trading site,
Blacksnow brought suit in the Central District of California but the suit was settled before
trial. See Richard Raysman & Peter Brown, Novel Legal Issues in Virtual Property, 234 N.Y. L.J.,
Aug. 10, 2005, at 28, col. 1 (describing the complaint and the legal issues surrounding the
complaint).
194. eBay is a well-known Internet auction website. EBAY, http://www.ebay.com (last
visited Mar. 2, 2012).
195. Class Action Complaint at ¶ 27, Hernandez v. Internet Gaming Entm’t, Ltd., No.
07-21403-Civ (S.D. Fla. May 31, 2007). In this pending lawsuit, users who played the game
World of Warcraft sued an online auction website that employed gold farmers, alleging
that the monetization and sale of virtual property devalued the currency in the world and
removed scarce resources. The complaint alleged that “IGE gold farmers are often citi-
zens of developing third world countries who spend up to 14 hours per day, or more,
logged into World of Warcraft® collecting resources and World of Warcraft® gold.” Id.; see
also Complaint, Blizzard Entm’t, Inc. v. In Game Dollar, L.L.C., No. 07-0589 (C.D. Cal. May
22, 2007) (terminated after permanent injunction granted, Jan. 28, 2008) (alleging abuses
414 MARYLAND LAW REVIEW [Vol. 72:381
2. Crowdfunding
Crowdfunding is an excellent illustration of the forces of cyber
commodification. While, traditionally, there have been numerous
barriers to raising investment capital, such as the limited number of
individuals with large amounts of money to invest or an innovator’s
limited ability to find and contact those individuals, these barriers can
201
be overcome through new crowdfunding models.
Crowdfunding appeals to those with small amounts of money to
202
invest. Crowdfunding websites allow entrepreneurs to communi-
cate information about their businesses and endeavors to a larger au-
203
dience. According to a recent book, crowdfunding covers a multi-
tude of activities:
Crowdfunding describes the collective cooperation, atten-
tion and trust by people who network and pool their money
and other resources together, usually via the Internet, to
support efforts initiated by other people or organiza-
tions . . . . The crowdfunding space is quite diverse, com-
prised of many niches, and shares a lot of social network-
ing’s energy. Whether to solicit donations and create a fan
base for an around-the-world sailing adventure, to pre-sell
copies of a book, or to finance a startup in return for equity,
204
some form of crowdfunding is available.
Pooling their money allows individuals with only small amounts
to invest the ability to join in the market, often helping artists and
201. See David Lavinsky, Funding Fathers, SMART BUSINESS (Aug. 27, 2010),
http://www.sbaonline.com/2010/08/funding-fathers-the-birth-of-business-crowdfunding-
is-providing-new-ways-to-get-money/ (“Crowdfunding turns the tables, because there are
now more potential investors than entrepeneurs.”).
202. Jobs Act Opens Doors for Smaller Investors to Boost Crowdfunding Appeal, COLUMBUS
BUS. FIRST (Apr. 27, 2012), http://www.bizjournals.com/columbus/print-edition/2012/
04/27/jobs-act-opens-door-for-smaller.html?page=all.
203. C. Steven Bradford, Crowdfunding and the Federal Securities Laws, 2012 COLUM. BUS.
L. REV. 1, 5 [hereinafter Bradford, Crowdfunding].
204. KEVIN LAWTON & DAN MAROM, THE CROWDFUNDING REVOLUTION 1 (2010) (in-
ternal quotation marks omitted).
416 MARYLAND LAW REVIEW [Vol. 72:381
205. Thomas Lee Hazen, Crowdfunding or Fraudfunding? Social Networks and the Securities
Laws—Why Any Specially Tailored Exemption Should Be Conditioned on Meaningful Disclosure, 90
N.C. L. REV. 1735, 1736–37 (2012).
206. For a comprehensive analysis of the Securities and Exchange Act provisions pre-
existing the JOBS Act, see Joan MacLeod Heminway & Shelden Ryan Hoffman, Proceed at
Your Peril: Crowdfunding and the Securities Act of 1933, 78 TENN. L. REV. 879, 885–927 (2011);
see also Bradford, Crowdfunding, supra note 203, at 5 (discussing whether crowdfunding in-
vestments are subject to the Securities Act and other regulatory issues).
207. KIVA, http://www.kiva.org (last visited Sept. 7, 2012).
208. How Kiva Works, The Long Version, KIVA, http://www.kiva.org/about/how/even-
more (last visited Sept. 7, 2012).
209. See infra notes 272–275 and accompanying text.
210. KICKSTARTER, http://www.kickstarter.com (last visited Sept. 8, 2012).
211. INDIEGOGO, http://www.indiegogo.com (last visited Sept. 8, 2012).
212. Nikki D. Pope, Crowdfunding Microstartups: It’s Time for the Securities and Exchange
Commission to Approve a Small Offering Exemption, 13 U. PA. J. BUS. L. 973, 977–78 (2011);
Learn Why, INDIEGOGO, http://www.indiegogo.com/learn/why (last visited Sept. 8, 2012);
Terms of Use, KICKSTARTER, http://www.kickstarter.com/terms-of-use?ref=footer (last visit-
ed Sept. 8, 2012).
2013] CYBER COMMODIFICATION 417
213
companies using those websites must meet. Needless to say, the
regulatory atmosphere for crowdfunding has now changed dramati-
cally. Professor Steven Bradford notes, however, that the costs of
complying with the crowdfunding exemption may be high enough
that only high profile or well-funded companies may be able to use it;
of course that somewhat defeats the purpose of assisting start-up
214
companies with their financing. While the regulatory environment
for crowdfunding has improved, we will need to see whether barriers
to entry will inhibit its growth.
213. Jumpstart Our Business Startups (JOBS) Act, Pub. L. No. 112-106, § 301-05, 126
Stat. 306, 315–23 (2012).
214. C. Steven Bradford, The New Federal Crowdfunding Exemption: Promise Unfulfilled, 40
SEC. REG. L.J. 1, 3–4 (forthcoming Fall 2012), available at http://papers.ssrn.com/sol3/
papers.cfm?abstract_id=2066088.
215. Marc Stern, Autopatching May Have Been Parent of Cell Phone System; At Least It Seems
So, EXAMINER (July 27, 2012), http://www.examiner.com/article/autopatching-may-have-
been-parent-of-cell-phone-system-at-least-it-seems-so (describing the development from
Ham radios that were available for free to the public to the development of today’s cell
phone business).
216. eBAY, http://www.ebay.com/ (last visited Sept. 7, 2012).
217. Factsheet, CRAIGSLIST, http://www.craigslist.org/about/factsheet (last visited Sept.
7, 2012).
418 MARYLAND LAW REVIEW [Vol. 72:381
218
North America. While two of craigslist’s founders, Craig Newmark
and John Buckmaster, were not interested in selling the company,
they were amenable to having eBay buy out the shares of the remain-
219
ing (third) shareholder, who was actively shopping his shares. Un-
derstanding that they would only acquire a minority holding of
28.4%, eBay sought to protect its interests through cumulative voting
220
rights. Mathematically, cumulative voting would give eBay one seat
on the three-person craigslist board, with Newmark and Buckmaster
221
as the two other directors. From their perspective, Newmark and
Buckmaster were concerned that eBay would use the information they
222
learned as shareholders to compete with craigslist. As such, they
built in provisions to remove certain rights from eBay’s equity shares
223
if eBay started a competing business.
From the beginning, the relationship between eBay and craigslist
was particularly fraught. In his 2010 opinion, Chancellor Chandler of
the Delaware Court of Chancery categorized the two companies as
224
“[o]il and [w]ater.” Expounding upon this theme, Chancellor
Chandler explained:
[E]ven though both companies enjoy household-name sta-
tus, craigslist and eBay are, to put it mildly, different ani-
mals. Indeed, the two companies are a study in contrasts,
with different business strategies, different cultures, and dif-
ferent perspectives on what it means to run a successful
business. . . . Though a for-profit concern, craigslist largely
operates its business as a community service. Nearly all clas-
sified advertisements are placed on craigslist free of charge.
Moreover, craigslist does not sell advertising space on its
website to third parties. . . . For most of its history craigslist
has not focused on “monetizing” its site. The relatively small
amount of monetization craigslist has pursued (for select job
postings and apartment listings) does not approach what
many craigslist competitors would consider an optimal or
even minimally acceptable level. . . . eBay is a for-profit con-
cern that operates its business with an eye to maximizing
power of the crowd behind it, a business that relies on user input and
content may find itself out of business entirely.
Despite all of these possible justifications for craigslist to operate
as it did, the Delaware Chancery Court insisted upon analyzing the
problem through the narrow lens of shareholder profit maximization.
234
As such, the “eBay model” was triumphant. In light of this holding,
it might be best for us to acknowledge that the temptation to mone-
tize something free may always be there, not just because of moral
hazard, but also because corporate law might suggest such a result as
235
the default rule. Whether this default is normatively desirable may
236
be another question. The monetization of friendship is also a part
of the process of cyber commodification, and I turn to that discussion
next.
B. Social NetWORKing
Another example of the process of commodification can be seen
in the monetization of friendship. Currently valued at an estimated
237
$100 billion, Facebook can be both a valuable personal and business
238
networking application. Indeed, in both the for-profit and non-
(last visited Dec. 22, 2012); see also Stephanie Rosenbloom, On Facebook, Scholars Link up
with Data, N.Y. TIMES, Dec. 17, 2007, at A1.
239. See Nicholas Carr, Is the Internet Making Us Quick but Shallow?, CNN (June 7, 2010)
(reporting that, according to one recent estimate, the average American spends over eight
hours a day in front of a screen, whether that is a computer, cell phone, or television, with
teenagers receiving over 2,000 text messages per month).
240. See Ethan J. Leib, Friendship and the Law, 54 UCLA L. REV. 631, 642–47 (2007) (de-
scribing characteristics of friends; money conspicuously absent from this description).
241. See Sandy Carter, Opinion: Boost Business, Let Your Workers Socialize Online, CNN
OPINION (June 19, 2012), http://articles.cnn.com/2012-06-19/opinion/opinion_carter-
social-business_1_social-networking-social-business-business-value?_s=PM:OPINION (“En-
terprise social networking tools are fundamentally changing the processes through which
we do business.”).
242. Stephanie Rosenbloom, Got Twitter? You’ve Been Scored, N.Y. TIMES, June 25, 2011,
at SR8.
243. About Us, KLOUT, https://www.klout.com/corp/about (last visited Sept. 7, 2012).
244. About PeerIndex, PEERINDEX, http://www.peerindex.com/help/about (last visited
Sept. 7, 2012).
245. TWITTER GRADER, http://tweet.grader.com/ (last visited Sept. 7, 2012).
246. Rosenbloom, supra note 242.
247. Id.
2013] CYBER COMMODIFICATION 423
248. Id.
249. Danielle Citron, Scoring Ourselves to Economic Death, CONCURRING OPINIONS (June
28, 2011, 6:24 PM), http://www.concurringopinions.com/archives/2011/06/scoring-
ourselves-to-economic-death.html.
250. See Somini Sengupta, So Much for Sharing his “Like,” N.Y. TIMES, June 1, 2012, at A1
(noting that marketers “leverag[e] one [Facebook] user’s stated preference . . . and
spread[] the word to that user’s friends”).
251. Id.
424 MARYLAND LAW REVIEW [Vol. 72:381
252
and social in nature, but also groundbreaking in scale and effect.”
Professor Celia Taylor notes that for a business model to qualify as so-
cial entrepreneurship, an “entity must engage in ordinary, viable
business enterprise. . . . [H]owever, a social business must be created
and run for the express purpose of pursuing specific, articulated so-
253
cial goals, rather than maximizing profit.” The concept is somewhat
related to corporate social responsibility (“CSR”), because social en-
trepreneurs like those who believe in CSR, aim to provide two interre-
254
lated goals, financial profit and social progress. As one author ex-
plains, however, they are different in the sense that social
entrepreneurship is, of necessity, built into the business, rather than
255
CSR, which may in some instances be “bolted on.” Without the so-
256
cial goal, the socially entrepreneurial business would not exist.
As social entrepreneurship is a fairly new concept, there are not
yet many concrete examples, and defining a social business can result
257
in some measure of interpretation and debate. One current busi-
ness model that seems to exemplify social entrepreneurship is micro-
finance. Grameen Bank founder Muhammad Yunus conceived of his
plan for microfinance based on his own observations of Bangladeshi
poverty and the provision of small personal loans from his own pock-
258
et. The idea was to assist some of the poorest people in the world by
providing seed money for small businesses that would also enrich
their communities by providing much-needed services. In such a way,
252. David E. Pozen, We Are All Entrepreneurs Now, 43 WAKE FOREST L. REV. 283, 297
(2008).
253. Celia R. Taylor, Berle and Social Business: A Consideration, 34 SEATTLE U. L. REV.
1501, 1505 (2011).
254. See, e.g., Janet E. Kerr, Sustainability Meets Profitability: The Convenient Truth of How
the Business Judgment Rule Protects a Board’s Decision to Engage in Social Entrepreneurship, 29
CARDOZO L. REV. 623, 634 (2007) (discussing legal aspects of social entrepreneurship); see
also What Is Social Entrepreneurship? The New Heroes, PBS (2005), http://www.pbs.org/
opb/thenewheroes/whatis/ (describing social entrepreneurship movement).
255. MARC J. LANE, SOCIAL ENTERPRISE EMPOWERING MISSION-DRIVEN ENTREPRENEURS
3 (2011).
256. Id. at 4.
257. S. Travis Certo & Toyah Miller, Social Entrepreneurship: Key Issues and Concepts, 51
BUS. HORIZONS 268 (2008).
258. Biography of Dr. Muhammad Yunus, GRAMEEN BANK (Oct. 2011),
http://www.grameen.com/index.php?option=com_content&task=view&id=329&&Itemid=
363.
2013] CYBER COMMODIFICATION 425
259
a small amount of money could yield large social dividends. Today,
the Grameen Bank has grown with international philanthropic sup-
port, but “Grameencredit” maintains as its most distinctive feature
260
that the loans are based on trust, not collateral. Other programs
may help teach those living in poverty skills such as installing solar
panels, which can help that person financially, and also increase the
261
standard of living in impoverished communities.
Individuals will likely donate either their money or their time to
socially entrepreneurial ventures for purely philanthropic reasons
and, while these may be the motivations for corporate donations as
well, a business might have other goals in engaging in social entre-
preneurship. Investing and participating in social businesses can un-
cover new markets for the sale of goods and services. As one com-
mentator notes, “[s]ocial ventures can provide important access to
markets, which companies can then capitalize on with their profit-
262
maximizing operations.” Corporations can also benefit from engag-
ing in social business as a research opportunity to learn about the
people, the culture, and the resources in the particular geographic
263
area where a social enterprise is implemented.
In other words, social entrepreneurship is a composite of various
business models, with a lesser degree of commodification. Other
such “hybrid” business models are currently being developed, includ-
ing businesses that focus on sustainability and those that have regis-
264. B Corporations, or “Benefit Corporations” are hybrids between for-profit and non-
profit companies. As a “B Corporation,” a company pledges to work toward other factors
other than profit, including environmental impact, positive treatment of workers, and
community relations. The company then files independently verified reports document-
ing its efforts to maintain B Corporation status. Michael R. Deskins, Benefit Corporation Leg-
islation, Version 1.0—A Breakthrough in Stakeholder Rights?, 15 LEWIS & CLARK L. REV. 1047
(2011); Antony Page & Robert A. Katz, The Role of Social Enterprise, 35 VT. L. REV. 59, 63
(2010); Danielle Douglas, Benefit Corporations Sign up, WASH. POST, Jan. 24, 2011, at A11.
2013] CYBER COMMODIFICATION 427
A. Prediction Markets
Prediction markets, also known as information markets, or idea
futures, are a relatively new technology that allows many individuals to
express their opinions on the Internet in a market setting. 265 By let-
ting people put “their money where their mouth is,” prediction mar-
kets encourage thousands of people to join together in cyberspace to
266
predict future events. These markets are more than games of
chance or entertainment, as they draw on the unique information,
knowledge, and skills that individual participants bring with them to
the market. Prediction markets enable everyone to reap the benefit
of the participants’ collective wisdom and, in so doing, advance utili-
tarian goals, creating social welfare and monetary value that go be-
yond the amounts invested in the markets.
Prediction markets organize and aggregate individual knowledge
267
into a collective result. Each individual who is a trader in the in-
formation market acts to maximize his or her own reward. At the
same time, the organizers of the market collectivize the results and
harvest the valuable information that market participants have gener-
ated. In his popular book, The Wisdom of Crowds, James Surowiecki
explains numerous ways in which such collective knowledge can be
268
employed. Whether individuals are asked to estimate the location
269 270
of a sunken submarine, to guess the weight of an ox, or to help a
271
contestant on the game show Who Wants to Be a Millionaire, groups
provided accurate answers to questions that most individuals would
not have been able to answer on their own. In a prediction market,
272. Joshua Blackman et al., Fantasy Scotus: Crowdsourcing a Prediction Market for the Su-
preme Court, 10 NW. J. TECH & INTELL. PROP. 125, 130 (2012).
273. Eugene F. Fama, Efficient Capital Markets: A Review of Theory and Empirical Work, 25 J.
FIN. 383, 383 (1970); Ronald J. Gilson & Reinier H. Kraakman, The Mechanisms of Market
Efficiency, 70 VA. L. REV. 549, 552–53 (1984).
274. See Fama, supra note 273, at 383.
275. See generally Michael T. Chng, A Model of Price Discovery and Market Design: Theory and
Empirical Theory, 24 J. FUTURE MARKETS 1107, 1108–10 (2004) (describing price discovery
function performed by derivatives markets).
276. See, e.g., Jordan Erin, Iowa Electronic Markets Yield Near-Accurate Result, DES MOINES
REG., Nov. 10, 2004, at B5 (discussing the relative accuracy of online futures markets com-
pared to polls).
277. JOYCE BERG ET AL., RESULTS FROM A DOZEN YEARS OF ELECTION FUTURES MARKETS
RESEARCH 1 (2000) [hereinafter BERG ET AL., RESULTS], available at
http://www.biz.uiowa.edu/iem/archive/BFNR_2000.pdf. The IEM has also expanded
into predictions further afield from its base of political predictions. Id. at 7 n.10; see also
Jordan Erin, U of I Markets Tapped to Predict Flu Activity, DES MOINES REG., Nov. 22, 2004, at
B1 (discussing the use of IEM to predict flu activity).
2013] CYBER COMMODIFICATION 429
278
ing a correct prediction. The IEM has predicted the outcomes of
elections more accurately than polls have, beating the polls seventy-six
279
percent of the time. This accuracy occurs despite the fact that re-
searchers at the University of Iowa have concluded that many of the
market participants exhibit a strong bias toward one candidate or
280
other. Apparently, the market is able to correct for these biases
281
through arbitrage; sensing an opportunity for profit, arbitrageurs
temper the ideological biases that some of the participants bring with
282
them when they make their initial investment in the IEM. Other
similar political prediction markets have appeared to predict the out-
283 284 285
come of elections in Austria, Germany, and Canada.
At the same time that prediction markets started to become more
common, the legal regime surrounding “real” money markets became
278. See Saul Levmore, Simply Efficient Markets and the Role of Regulation: Lessons from the
Iowa Electronic Markets and the Hollywood Stock Exchange, 28 J. CORP. L. 589, 589 (2003) (ex-
plaining that the IEM “is a controlled environment . . . which allows participants to invest
modest amounts of (real) money in certain ‘decision markets.’”).
279. JOYCE BERG, ET AL., ACCURACY AND FORECAST STANDARD ERROR OF PREDICTION
MARKETS 12–13, 33 tbl.3. (2003) [hereinafter BERG ET AL., ACCURACY], available at
http://www.biz.uiowa.edu/iem/archive/forecasting.pdf.
280. BERG ET AL., RESULTS, supra note 277, at 5. The average trader is younger, more
likely to be a white male, Republican, and of a higher socio-economic status than the aver-
age voter. BERG, ET AL., ACCURACY, supra note 279, at 10.
281. See, e.g., Donald C. Langevoort, Taming the Animal Spirits of the Stock Markets: A Be-
havioral Approach to Securities Regulation, 97 NW. U. L. REV. 135, 140 n.15 (2002). Professor
Langevoort defines arbitrage as the
process by which informed traders buy or sell in such a way as to eliminate any
mispricing caused by uninformed trading. For example, when a stock becomes
overvalued because uninformed traders are bidding it up, informed traders
would sell, hence moving the price back to its rational expectations equilibrium.
Id.
282. BERG ET AL., RESULTS, supra note 280, at 6.
283. AUSTRIAN POLITICAL STOCK MARKETS / AUSTRIAN ELECTRONIC MARKETS,
http://www.ebweb.at/apsm/ (last visited Feb. 7, 2013) (information markets predicting
outcomes of Austrian elections).
284. WAHLSTREET, http://www.wahlstreet.de (last visited Mar. 4, 2012) (information
market predicting outcomes of German elections).
285. ELECTION STOCK MARKET, http://esm.ubc.ca (last visited Mar. 4, 2012) (infor-
mation market predicting outcomes of Canadian elections).
430 MARYLAND LAW REVIEW [Vol. 72:381
286
more chilly. In 2006, an online gambling ban enacted in the Unit-
ed States had a devastating effect on the growth of publicly available
287
prediction markets. Although prediction markets are not the same
as betting in a horse race, the prediction market seeks information
above and beyond allocation between players, the law was written so
288
broadly that prediction markets were swept into its coverage. De-
spite some argument on the part of the author that prediction mar-
kets involved speech and expressive conduct, the gambling ban has
meant that the majority of publicly available prediction markets have
either been forced into using play money or have taken their opera-
289
tions overseas.
Ultimately, the regulatory ban on using money in prediction
markets effectively frustrated the development of an important in-
formation-gathering technology. The larger point, which I return to
in Part VI, is that commodification in and of itself is not necessarily
“bad” when it comes to a developing technology. In fact, commodifi-
cation can be quite beneficial at times, especially when it functions to
incentivize participants to reveal information, predictions, and
knowledge that could benefit others. While some commodification
situations cry out for more regulation, perhaps because of the desper-
ation of those engaged in them, or some idea of exploitation, those
elements could not be further from the type of useful predictive activ-
ity present in an information market. As such, regulation of commod-
ification should be fully analyzed before being imposed—especially
when the technology affected in this instance was not even truly the
286. Miriam A. Cherry, Morality and Markets: A Comment on Predicting Crime, 52 ARIZ. L.
REV. 73, 73–74 (2010).
287. In October 2006, Congress passed the Unlawful Internet Gambling Enforcement
Act of 2006, Security and Accountability for Every Port Act of 2006, Pub. L. No. 109–347,
120 Stat. 1884, 1952. See Cherry & Rogers, Prediction Markets, supra note 27, at 840–46 (ana-
lyzing impact of the Unlawful Internet Gaming Enforcement Act).
288. See Cherry & Rogers, Prediction Markets, supra note 27, at 835 (“[I]n the congres-
sional zeal to stamp out Internet gambling, information markets are in danger of being
trampled.”); see also Joshua Blackman et al., Cutting Access to InTrade Violates Americans’ Free
Speech Rights, HOUS. CHRON. (Dec. 7, 2012), available at http://www.chron.com/opinion/
outlook/article/Cutting-access-to-InTrade-violates-Americans-4100729.php (noting the
injustice in enforcement against prediction market headquartered in the United King-
dom).
289. See Emile Servan-Schreiber et al., Prediction Markets: Does Money Matter?, 14
ELECTRONIC MARKETS 243, 243 (2004) (conducting an experiment to determine whether
the accuracy of prediction markets are affected by play money versus real money).
2013] CYBER COMMODIFICATION 431
subject of the regulation. With that lesson, I turn to see how access to
legal and government materials has been commodified, somewhat in
defiance of the notion that these materials should be publicly availa-
ble to all citizens. Recent developments are somewhat encouraging
that access to information may be more forthcoming—but this area is
also not without its dispute.
290. See, e.g., Brian G. Slocum, The Importance of Being Ambiguous: Substantive Canons,
Stare Decisis, and the Central Role of Ambiguity Determinations in the Administrative State, 69 MD.
L. REV. 791, 843 (2010) (“Traditionally, in statutory interpretation cases, the Court accords
‘special force’ to its precedents, unlike its decisions interpreting the Constitution where
stare decisis principles are not as strong.”).
291. See Michael W. Carroll, The Movement for Open Access Law, 10 LEWIS & CLARK L. REV.
741, 742–43 (2006) (discussing the history of the movement for open access law).
292. See id. at 743–44 (“In 1990, the Court cooperated with the Hermes project at Case
Western Reserve University to make the Court’s opinions freely available on the Inter-
net.”).
293. See id. at 742 (“[Y]ou do not have sufficient time to go to a law library in the hopes
that such an article might lie within.”).
294. See Carroll, supra note 291, at 742–43 (describing the difficulty of finding materials
before computerized access became available).
432 MARYLAND LAW REVIEW [Vol. 72:381
295. See Cary Griffith, Two Legal-Specific Sites Are Meant to Make Life Easier, CORP. LEGAL
TIMES, June 1, 2001 (explaining that legal information is available in a variety of formats
including CDs).
296. WESTLAW, www.westlaw.com (last visited Mar. 4, 2012).
297. LEXISNEXIS, www.lexis.com (last visited Mar. 4, 2012).
298. See Jonathan Gaw, The Struggle to Innovate, STAR TRIB., April 13, 1998 (explaining
the process of cite checking using these online legal databases).
299. See Ashlee Vance, Legal Sites Plan Revamps as Rivals Undercut Price, N.Y. TIMES, Jan.
24, 2010, at B5 (discussing online legal database pricing); Ashby Jones, Can Bloomberg Com-
pete with Westlaw and LexisNexis? WALL ST. J. LAW BLOG (July 8, 2010),
http://blogs.wsj.com/law/2010/07/08/can-bloomberg-law-compete-with-westlaw-and-
lexisnexis/ (same).
300. See Daniel Fisher, Open-Sourcing the Law, FORBES, June 20, 2008 (“Big law firms will
continue to use Westlaw and Lexis for a long time.”).
301. See Vance, supra note 299 (noting that Westlaw and Lexis contain various types of
legal documents in addition to cases).
2013] CYBER COMMODIFICATION 433
The same access problem is also present with academic legal re-
302
search. In the field of legal studies, law review articles and other le-
gal academic writing has historically been difficult for the public to
303
access freely. Most law schools publish a law review, and in some in-
stances schools also publish secondary journals specializing in a par-
ticular type of legal scholarship. Historically, law reviews were only
available to those that had a subscription, with the result that law li-
braries were one of the few places these materials were available. As
technology developed, Westlaw and Lexis placed law review articles
online. While legal academics and law students worked for free to
write and edit these articles, these online databases charged their sub-
scribers for access to these works. Not only are these databases ex-
pensive, but a year or more would often pass between the time au-
thors submitted their work to the law review and the time when the
304
article actually would be available on the electronic database.
More recently, many law reviews began making published articles
305
available for free on their websites. While this was a significant step
toward more accessibility, there is no centralized aggregating or in-
dexing service that allows for search across different law review web-
sites. Likewise, law journals only post the final versions of articles,
meaning that there continues to be a significant time lag between
when an article is given to the law review editors and when it becomes
306
available to the public.
Enter the Social Science Research Network (“SSRN”), which
307
touted its website as a free platform for housing academic research
302. See Carroll, supra note 291, at 748 (“Prices of scholarly journals outpaced costs,
however, and concerns about maintaining affordable access to the scholarly literature be-
gan to grow.”).
303. See Dan Hunter, Walled Gardens, 62 WASH. & LEE L. REV. 607, 613 (2005) (describ-
ing difficulty accessing materials and calling on law review publishing to become more
open access).
304. See James Grimmelmann, Why I No Longer Post to SSRN, THE LABORITORIUM (Nov.
28, 2006, 11:29 PM), http://laboratorium.net/archive/2006/11/28/why_i_no_longer_
post_to_ssrn [hereinafter Grimmelmann, Why I No Longer Post] (“The online services—
Lexis, Westlaw, and Hein[—]add their own lag time . . . .”).
305. See, e.g., MD. L. REV., http://digitalcommons.law.umaryland.edu/mlr/ (last visited
Dec. 22, 2012).
306. See Grimmelmann, Why I No Longer Post, supra note 304 (“Law reviews run on a de-
lay between acceptance and final publication that can easily exceed a year.”).
307. Home Page, SOC. SCI. RES. NETWORK, http://www.ssrn.com (last visited Mar. 4,
2012).
434 MARYLAND LAW REVIEW [Vol. 72:381
308
in the social sciences. The SSRN website is a platform that allows
309
registered users to post drafts of their articles to the Internet. Alt-
hough SSRN does not allow for content searching in the same way as
commercial database like Westlaw or Lexis, it has the advantage of
making an author’s work almost immediately available. The fact that
it is a free service is a huge assistance to those who are searching for
legal knowledge but do not have access to expensive databases. This
was such an advantage that many thought of SSRN as cutting edge—a
new and revolutionary “open access” way of thinking about legal and
310
social science scholarship. Legal academics were able to point oth-
ers to their work quickly and for free, expanding their readership and
311
the audience for their ideas.
Quickly, however, concerns among academics began to emerge.
Even though SSRN had acted in many ways like an open access non-
profit and was run by prominent academics, the website is actually
312
structured as a for-profit corporation. Many academics found out
about the for-profit nature of SSRN in surprising ways. First, there
was a false alarm that SSRN was going to charge for access to papers.
It was then learned that SSRN would not charge for Internet viewing
but would sell bound hard copies of papers to those who wanted such
313
a printout. Later, users of the website began to see advertisements
on the sides of the screen that were tied to the topics of the papers
that were being searched. Further, any article that was posted on
SSRN received an SSRN watermark down the middle of the page as a
308. See Hunter, supra note 303, at 617 (“SSRN is an organization that acts as a free
online repository for scholarly papers in the social sciences.”).
309. Id.
310. See id. (“‘Open access’ is the label for the principle that scholarly publishing
should be freely available to everyone, without charge, political censorship, or commercial
interference.”).
311. Id.
312. Matthew Bodie, An Interview with SSRN’s Gregg Gordon, PRAWFSBLAWG (June 15,
2006, 11:49 AM), http://prawfsblawg.blogs.com/prawfsblawg/2006/06/an_interview_wi.
html (questioning SSRN’s commitment to open access scholarship given the for-profit na-
ture of its business).
313. Gary D. Price, New from SSRN (Social Science Research Network): Option to Purchase
Bound Hard Copies of Selected Papers, INFODOCKET.COM (July 27, 2011, 12:34 PM),
http://infodocket.com/2011/07/27/new-from-ssrn-social-science-research-network-
option-to-purchase-bound-hard-copies-of-selected-papers/.
2013] CYBER COMMODIFICATION 435
314
form of advertising. Through all of these efforts, SSRN has been
testing ways to commercialize its website but the professors who were
posting papers did not necessarily realize that their postings were in
the process of being commercialized by others.
As Professor James Grimmelmann noted, in describing the rea-
sons that he was choosing to post his research papers elsewhere:
[I]f you make your money by selling subscriptions, then it
makes institutional sense to place your own advertising on
the goods. Never mind what these decisions do to open ac-
cess to scholarship. That’s no longer the point. SSRN is a for-
profit corporation. It’s not yet (I think) a money-making
corporation, but its goal is to make money for its owners. It
has chosen to do so by providing useful open-access services
to scholars, but when push comes to shove, the bottom line
comes before the open access part. We don’t need to blame
SSRN or find fault with it. It’s just doing what comes natu-
rally—making the decision that [it has] supplied sufficient
open access to fit into a market niche and declaring that
315
good enough.
In other words, whether a website promotes an open access ethic
or is a commercialized venture is an important norm. When opera-
tors of platforms and users are not in agreement about what those
norms should be, disputes arise. While at first SSRN seemed to prom-
ise a revolution in open access that might make a very real difference
in the status quo of legal research, the question is whether it will ded-
icate itself to that mission in the future. Will the owners of SSRN suc-
cumb to moral hazard? SSRN may be poised for the same type of dis-
pute between owners and users that rocked the Huffington Post.
C. “Free” Wi-Fi
Another area of contest and dispute about monetization con-
cerns the provision of wireless fidelity (“Wi-Fi”). Wi-Fi is an almost
ubiquitous recent phenomenon, allowing Internet access in public
settings, such as coffee shops, restaurants, hotels, or airports. At the
end of the 1990s, small, independent, local businesses tended to pro-
vide free Internet service and chains and large businesses tended to
314. James Grimmelmann, SSRN Considered Harmful, THE SELECTED WORKS OF JAMES
GRIMMELMANN (Feb. 26, 2007), http://works.bepress.com/com/james_grimmelmann/
14/.
315. Grimmelmann, Why I No Longer Post, supra note 304.
436 MARYLAND LAW REVIEW [Vol. 72:381
charge customers for access. Within the last year or so, however, the
market has undergone a paradigm shift, with large chains now offer-
316
ing free Wi-Fi. Meanwhile, small businesses, perhaps because of the
challenging economic environment during the recession, have started
317
charging for their Wi-Fi services.
Wi-Fi, which had existed on some university campuses, started to
318
see more widespread adoption around the turn of the century.
Among one of the first commercial users of this new technology was
Starbucks, which announced at the beginning of 2001 that they would
begin rolling out Wi-Fi access across the United States in a partner-
319
ship with MobileStar. The results were incredible: By the end of the
year, over five hundred Starbucks had installed Wi-Fi and had high
320
transmission speeds. Access to the Starbucks network did not come
cheaply, however. Users could choose between $15.95 a month for
unlimited access, or use a pay-as-you-go plan which cost “about $3 for
321
fifteen minutes.” Only ten months after the announced partnership
with Starbucks, MobileStar went out of business, and at least one ana-
lyst speculated that the high cost of its pricing structure was to
322
blame. Quickly, other Wi-Fi providers moved into the market, and
some began offering free access—perhaps most noticeably a non-
323
profit which provided free Wi-Fi to areas in New York City.
By 2003, news accounts noted that Wi-Fi access in commercial
space had increased to include the now-defunct Borders Books and
316. Claire Cain Miller, Aiming at Rivals, Starbucks Will Offer Free Wi-Fi, N.Y. TIMES, June
15, 2010, at B1 [hereinafter Miller, Aiming at Rivals].
317. See, e.g., Coffee Houses Divided on Wi-Fi, CHI. TRIB., Mar. 5, 2012, at 1 (noting that
some small businesses are limiting Wi-Fi use to customers unless they make purchases after
certain lengths of time).
318. See Vikas Bajaj, Starbucks to Serve Faster Wireless Internet Connections, DALL. MORNING
NEWS, Jan. 4, 2001, at 1D (noting the anticipated expansion, in 2001, of Wi-Fi from univer-
sities and corporate campuses to broader audiences).
319. Id. MobileStar had been responsible for Wi-Fi access at 130 airports. Id.
320. Michelle Megna, Wireless at Starbucks, DAILY NEWS, Aug. 16, 2001, at 12.
321. Id.
322. Mark Kellner, MobileStar Killed by Its Own Greed, WASH. TIMES, Oct. 15, 2001, at D6.
323. See Michelle Megna, Wireless Areas Around the City Let You Access the Internet for Free,
DAILY NEWS (N.Y.), Oct. 21, 2001, at 6 (discussing the grassroots efforts of NYCwireless to
create free Wi-Fi zones).
2013] CYBER COMMODIFICATION 437
324
McDonald’s, smaller retailers, and some locations in Canada. Pric-
ing structure was in a state of flux, likely due to the new players enter-
325
ing the market. While retailers like Starbucks still charged access
fees, McDonald’s and retailers like it provided an hour of free access
326
with the purchase of certain meals. Other providers also sought to
enter the market and provide Wi-Fi access to consumers for free, hop-
327
ing to monetize access to these users by selling advertisements. At
least some of these providers saw themselves in direct competition
328
with the older market participants, like Starbucks. The approach
seemed to be working and, by mid-2003, both the technology and fi-
nance sectors had doubts about the ability to capitalize Wi-Fi hotspots,
some cautioning that the industry would do well to remember the pit-
329
falls of the then recent dot-com crash.
It seemed the tipping point for free Wi-Fi access arrived in 2004.
News media continued to publish stories highlighting the increasing
proliferation of Wi-Fi networks, while simultaneously casting doubts
330
that models requiring payment for access were sustainable. The
media portrayed the payment model as facing stiff competition from
331 332
those providing free Wi-Fi, both intentionally and accidently.
Small businesses proclaimed they would use free Wi-Fi access as a loss-
leader to draw in business—sometimes evoking Starbucks directly in
324. David Akin, Do You Want Wi-Fi to Go with Those Fries?, GLOBE AND MAIL, Mar. 12,
2003, at B5.
325. Id.
326. Id.
327. Rob Wright, Wireless for Free—Solution Provider Invents an Innovative Marketing Ap-
proach, VARBUS., May 26, 2003, at 62.
328. Id.
329. Karen Lowry Miller, The Wi-Fi Bubble, NEWSWEEK, Aug. 3, 2003, at 36.
330. Matt Richtel, Where Entrepreneurs Go and the Internet is Free; Wi-Fi Providers Rethink
How to Make Money, N.Y. TIMES, June 7, 2004, at C1.
331. See Crayton Harrison, Wi-Fi for Free: You Get a Place to Surf; Shops Get a Loyal Clientele,
DALL. MORNING NEWS, Oct. 14, 2004, at 3D (contending that many Dallas area businesses
are providing free Wi-Fi as a loss leader).
332. See Jefferson Graham, Businesses Cast Wi-Fi Lures to Hook Customers, USA TODAY,
Sept. 13, 2004, at 5B (quoting a customer as saying: “If I have to use a Starbucks and pay, I
will. . . . But there are so many places now that are free, I don’t have to use the Starbucks
option very often”).
438 MARYLAND LAW REVIEW [Vol. 72:381
333
comparison. However, by 2005, a report by JiWire, Inc. seemed to
dampen those projections, noting that of the 34,544 Wi-Fi hotspots
listed, only ten percent were free, while Starbucks and McDonald’s
334
maintained about half of those hotspots.
The competition between price structures has not yet subsided
despite the frequent shifting in the market, both in terms of who the
providers are and what share of the market they captured. In 2008,
one of the largest providers of Wi-Fi access, AT&T, moved to allow
free unlimited access at any of its hotspots—provided the customer
335
purchased home high speed Internet first. Shortly thereafter,
AT&T partnered with Starbucks to service its Wi-Fi and offered two
336
free hours of access, then a first for Starbucks. This move did not
prevent small local coffee shops, large chains like Panera, and even
fast food restaurants like Schlotzky’s Deli from providing free Wi-Fi
337
access as an attempt to woo visitors from Starbucks. Interestingly,
soon after partnering with AT&T, Starbucks announced it would at-
tempt to fuse both price structures by granting limited free access to
338
customers who used a loyalty card at least once per month. USA To-
day noted that Starbucks rolled the program out during “the worst
slump in its history” and likely did so in an attempt to draw customers
339
and profits.
Anecdotal evidence suggests that independent coffee shop own-
ers, at least those in New York City, are starting to reverse course and
333. Lisa Lacy, Panera Bread Co. Hopes Customers Hang Around, ‘Chill Out’: Try the Wi-Fi
Web Access, NAT’L POST’S FINANCIAL POST & FP INVESTING, Dec. 3, 2004, at 3.
334. Karen Robinson-Jacobs, Take a Sip and Stay Awhile—While Surfing at High Speed: Res-
taurants and Cafes Lead the Pack in Offering Wi-Fi Connections, DALL. MORNING NEWS, Feb. 26,
2006, at 5D.
335. Elena Malykhina, AT&T’s Broadband Customers Get Unlimited Wi-Fi, INFO.WK., Jan.
23, 2008.
336. W. David Gardner, AT&T Pushes Wi-Fi Into Starbucks, INFO.WK., Feb. 11, 2008.
337. W. David Gardner, Wi-Fi Cafes; Easy to Find, but Free is Fading Away, INFO.WK., Apr.
29, 2008.
338. Susan Stellin, Free Wi-Fi, but Not for All, N.Y. TIMES, May 6, 2008, at C6.
339. Bruce Horovitz, Starbucks’ New Flavor: Free Wi-Fi; Chain Hopes to Perk up Traffic, USA
TODAY, June 3, 2008, at 9A. Interestingly, less than a month after the free AT&T Wi-Fi
program, T-Mobile, Starbucks’s former Wi-Fi provider, filed suit against Starbucks claiming
a breach of contract. T-Mobile Sues Starbucks over Hot Spots, N.Y. TIMES, June 7, 2008, at C2.
Three days later, the parties entered into a memorandum of understanding. W. David
Gardner, Starbucks And T-Mobile Settle Dispute over Wi-Fi, INFO.WK., June 12, 2008.
2013] CYBER COMMODIFICATION 439
340
remove free Wi-Fi due to a tightening economy and increased costs.
Further evidence suggests that smaller owners do not see their cus-
tomer base becoming disillusioned with these developments, seem-
ingly believing that focusing on locality and small businesses will keep
341
their customers spending. It seems their theory will soon be put to
the test since, in 2010, Starbucks announced it would be removing all
pay mechanisms from its Wi-Fi access to allow unrestricted free ac-
342
cess.
Despite nearly ten years of technological development and con-
sumer demand, no clear consensus on Wi-Fi pricing structure exists.
While it would seem that customers would vastly prefer free Wi-Fi ra-
ther than have it tacked on as an extra charge of staying in a hotel
room, for example, consumers are apparently willing to pay for Wi-Fi
as a matter of convenience. Despite being a pioneer of commercial
Wi-Fi application, Starbucks resisted the movement to free Wi-Fi until
2010, when it suddenly reversed its policy. Meanwhile, small busi-
nesses seem to now be eschewing free Wi-Fi in the hopes of lowering
their costs, hoping that their supporters will stay loyal anyway. As to
how this impacts consumer expectations, consumers may not be sure
what the pricing structure will be and where they will receive free ac-
343
cess. From these lessons, we turn next to the larger doctrinal and
theoretical implications of cyber commodification.
340. David Usborne, US Coffee Shops Pull Plug on Laptop Lounging; Owners Fed up with Pa-
trons Buying a Coffee and Then Surfing Web for Hours, INDEP., Aug. 8, 2009, at 30.
341. Miller, Aiming at Rivals, supra note 316.
342. Id.
343. More recently, with the advent of smartphones, many rely on their phones to
check email and surf the web, independent of Wi-Fi. See Stan Freeman, Smartphone Users
Rise in Numbers, REPUBLICAN, Aug. 1, 2011, at A1 (claiming that one in four smartphone
users in America do most of their online browsing through their smartphones).
440 MARYLAND LAW REVIEW [Vol. 72:381
theoretical points that can be drawn from the examples that I have
spun out.
First, it is of note that the issues surrounding cyber commodifica-
tion are similar in some respects to the debate in intellectual property
(“IP”) law about creating proper incentives for creators by protecting
IP rights while at the same time allowing for experimentation, parody,
fair use, and open access. This central conflict is played out in many
of the debates over open access material versus the incentive to copy-
344
right. Similar argumentative tropes might be applicable in the con-
text of cyber commodification. The problem, however, is slightly dif-
ferent, as the value generated from various collaborative activities
comes from the wisdom of the crowd and the aggregation of talents
and opinions, rather than the work of an individual creator seeking
345
intellectual property protection for a personal invention.
Second, rather than looking at the issue in cold or impersonal
market rhetoric, it is important to recognize commodification as a
more human sociological issue. As noted by Viviana Zelizer in The So-
cial Meaning of Money, “[w]hile money does serve as a key rational tool
of the modern economic market, it also exists outside the sphere of
the market and is profoundly influenced by cultural and social struc-
346
tures.” In her book, Collateral Knowledge, Professor Annelise Riles
provides further anthropological insights into the social construction
347
of markets. Professor Riles argues persuasively that market compo-
nents, such as the notion of collateral, may function as substitutes for
personal knowledge of the counterparty to a transaction or elaborate
348
dispute resolution mechanisms. These insights are important to
understanding another point raised by Professor Zelizer:
Clearly, a link is missing in the traditional approach to
money. Impressed by the fungible, impersonal characteris-
344. See, e.g., Brett M. Frischmann, An Economic Theory of Infrastructure and Commons
Management, 89 MINN. L. REV. 917, 921 (2005) (discussing the difficulty that Americans
face in deciding between open access and restricted access with respect to various re-
sources); Michael J. Madison et al., Constructing Commons in the Cultural Environment, 95
CORNELL L. REV. 657, 666–67 (2010) (same).
345. See id. at 672 (suggesting that a collaborative environment within an intellectual
property framework necessitates the sharing and borrowing of ideas and resources from
one another).
346. VIVIANA A. ZELIZER, THE SOCIAL MEANING OF MONEY 18 (1994).
347. ANNELISE RILES, COLLATERAL KNOWLEDGE: LEGAL REASONING IN THE GLOBAL
FINANCIAL MARKETS 54–55 (2011).
348. Id.
2013] CYBER COMMODIFICATION 441
351. See Dahl v. Hem Pharmaceuticals Corp., 7 F.3d 1399, 1404–05 (9th Cir. 1993)
(holding that information gathered in a clinical drug trial could constitute consideration
necessary to finding of a contractual relationship, in a case where a pharmaceutical com-
pany promised study participants free drug treatment in exchange for participation but
later reneged on its promise by arguing that provision of the medicine was only gratui-
tous).
352. See RESTATEMENT (THIRD) OF RESTITUTION AND UNJUST ENRICHMENT § 1 cmt. B
(Discussion Draft 2000) (“Unjustified enrichment is enrichment that lacks an adequate
legal basis: it results from a transfer that the law treats as ineffective to work a conclusive
alteration in ownership rights.”); LORD GOFF OF CHIEVELEY & GARETH JONES, THE LAW OF
RESTITUTION 13 (Gareth Jones ed., 6th ed. 2007) (noting that unjust enrichment is a
“principle of justice which the law recognizes and gives effect to in a wide variety of
claims”).
353. Peter Linzer, Rough Justice: A Theory of Restitution and Reliance, Contracts and Torts,
2001 WIS. L. REV. 695, 764.
2013] CYBER COMMODIFICATION 443
354. See Miriam A. Cherry, Working for (Virtually) Minimum Wage: Applying the Fair Labor
Standards Act in Cyberspace, 60 ALA. L. REV. 1077, 1105–10 (2009). My analysis of the con-
tractual issues involved has remained constant, and therefore I have adapted my earlier
reasoning to the realm of cyber commodification.
444 MARYLAND LAW REVIEW [Vol. 72:381
355
downloads, or order products. Clickwraps, however, have serious
356
problems and have been subject to a withering critique. Commen-
tators have noted that clickwraps incorporate some of the worst char-
357
acteristics of adhesion contracts, allowing for “acceptance” or “re-
358
jection” of the terms as a whole only on a take it or leave it basis.
Many of the boilerplate terms contained in online agreements are of-
359
ten harsh, some so much so that they may be unconscionable.
There thus is a real concern that these types of “agreements” may not
embody a worker’s true assent, or represent any kind of an informed
decision about the terms. This may not be the type of “assent” or
“agreement” that is needed in order to inform workers of their rights,
especially since workers tend not to understand many of the basic
rights and responsibilities governing the employment relationship in
360
any case.
In the employment realm, contractual ordering is somewhat dif-
ficult in part because the minimum wage law, the Fair Labor Stand-
361
ards Act (“FLSA”), is an immutable default rule—normally it cannot
be waived, by clickwrap or other contract. After all, if employers and
employees could simply opt out of the minimum wage, the law would
cease to have any meaning. Companies might choose to exploit such
an exemption opportunistically, not just to apply to those who partic-
ipate as volunteers and for entertainment.
Given the problematic nature of private ordering by contract,
might some other solution be found? As I have argued elsewhere,
355. See, e.g., Robert A. Hillman & Jeffrey J. Rachlinski, Standard-Form Contracting in the
Electronic Age, 77 N.Y.U. L. REV. 429 (2002).
356. Id. at 440–41.
357. Todd D. Rakoff, Contracts of Adhesion: An Essay in Reconstruction, 96 HARV. L. REV.
1173 (1983) (providing a summary of adhesion contracts concepts).
358. Id. at 1174.
359. See, e.g., Shmeul I. Becher & Tal Z. Zarsky, E-Contract Doctrine 2.0: Standard Form
Contracting in the Age of Online User Participation, 14 MICH. TELECOMM. TECH. L. REV. 303
(2008); Mark A. Lemley, Terms of Use, 91 MINN. L. REV. 459 (2006); Robert L. Oakley, Fair-
ness in Electronic Contracting: Minimum Standards for Non-Negotiated Contracts, 42 HOUS. L.
REV. 1041 (2005); Juliet M. Moringiello & William L. Reynolds, From Lord Coke to Internet
Privacy: The Past, Present, and Future of the Law of Electronic Contracting, 72 MD. L. REV. 452,
468–69 (2013).
360. Pauline T. Kim, Bargaining with Imperfect Information: A Study of Worker Perceptions of
Legal Protection in an At-Will World, 83 CORNELL L. REV. 105 (1997).
361. Fair Labor Standards Act of 1938, ch. 676, 52 Stat. 1060 (codified as amended at
29 U.S.C. §§ 201–19 (2006)).
2013] CYBER COMMODIFICATION 445
there are several factors that should be given a prominent role in any
determination of whether online activity is “work” and subject to regu-
lation under FLSA. One factor to consider would be the question of
whether the activity is considered paid work in other context. If that
is the case, perhaps commodification is an indication that the market
activity that goes on there should properly be classified as paid work.
Another factor might be whether the work is “de-skilled” work. In
such situations, the potential for exploitation might be higher, and
thus the protections of the FLSA might be more important.
Finally, since the Department of Labor may choose to regulate
this activity in the future, it might make sense for private employers
that are experimenting with this type of work—and the websites that
facilitate them—to attempt a voluntary effort in order to frame the
dialogue if in fact an extension of the FLSA is proposed, which seems
likely. One such response might be to construct a code of “best prac-
tices” for cyberwork that attempts to draw some of the lines between
work and entertainment activity, and set out some guidelines that
would prevent the more extreme forms of exploitation. These “best
practices” would be influential if they formed a core set of expecta-
tions to which both workers and employers could adhere. If such a
voluntary response is present, the line-drawing exercise necessitated
by the FLSA may not be as difficult as it might first appear.
362. See supra Parts II.B.1, IV.A (discussing crowdsourcing and prediction markets); see
also CASS SUNSTEIN, INFOTOPIA: HOW MANY MINDS PRODUCE KNOWLEDGE 3–5 (2006) (dis-
cussing uses of crowdsourcing and prediction markets in public institutions and noting
that “[c]ollaborative projects, often involving numerous strangers, are growing in both
scale and quality, to the benefit of millions of people”).
446 MARYLAND LAW REVIEW [Vol. 72:381
363. See Teppo Felin & Todd R. Zenjer, Information Aggregation, Matching and Radical
Market-Hierarchy Hybrids: Implications for the Theory of the Firm, 9 STRATEGIC ORG. 163, 163–
64, 166 (2011) (noting that both crowdsourcing websites and prediction markets harness
the power of the crowd and also perform information aggregating and matching func-
tions).
364. See Hetcher, supra note 49, at 995 (“[T]he more people who are on Facebook, the
more it is in one’s interest to be on Facebook.”).
365. See, e.g., John Cassidy, Me Media, NEW YORKER, May 15, 2006, at 50 (describing the
lucrative advertising opportunities on Facebook and the idea that the more views a site
has, the greater the revenue it will generate).
366. See Jenny Preece, Sociability and Usability in Online Communities: Determining and
Measuring Success, 20 BEHAV. & TECH. 347, 347–48, 51 (2001) (discussing how the number
of participants and their contributions determine the success of online communities).
367. See supra note 51 (listing several of Professor Radin’s works).
368. See, e.g., Benkler, supra note 199, at 372 (discussing Coase’s theory of the firm).
2013] CYBER COMMODIFICATION 447
regales the reader with rich descriptions of the Linux operating sys-
379
tem, Wikipedia, Project Gutenberg, and the NASA Mars project. In
all of these online endeavors, users coordinate their efforts through
collaboration by using small segments of their time, talents, or com-
puting power. In Benkler’s vision, this “peer production” model pre-
sents another option for economic coordination (in addition to
Coase’s description of markets and firms) when certain conditions are
380
met. Throughout the book and the law review article, it is no secret
that Professor Benkler strongly advocates for the importance of the
peer production model. According to Professor Benkler, money does
not (and moreover should not) play into the motivations of the par-
381
ticipants. Rather, he claims, users are motivated by intellectual joy,
pride, excellence, giving back to the community, and other similar
382
non-monetary interests. While Professor Benkler mostly assumes
that the users’ interests and those of the creators match, he does oc-
casionally allude to the idea of moral hazard.
In Professor Benkler’s view, peer production stands the best
chance of succeeding when the model is able to take into account the
383
differing interests, talents, and capabilities of the users. He suggests
that projects allowing users to harness their talents and match them
with available tasks will be the most efficient for the peer production
384. See id. at 376 (discussing the importance of efficiency of self-identifying tasks in
peer production).
385. Id. at 378–79.
450 MARYLAND LAW REVIEW [Vol. 72:381
386
Article. In fact, the lack of money for work on the Internet—
especially when it concerns the meager wages paid to workers in de-
veloping countries in a crowdsourcing scheme—can smack more of
exploitation than free collaboration.
One way to look at this is as a coordination problem. As we know
from Coase’s theory of the firm, both markets and firms are ways of
387
efficiently organizing economic activity. So what motivates people
in a non-commodified crowdsourcing situation? The question of mo-
tivation is far more complicated than homos economius would have us
388
believe. There is a complicated series of motivations that drive any
one person, including a mixture of altruism and self-interest. Fur-
ther, while certain tasks might be freely volunteered, other tasks are
simply too boring, mundane, annoying, or time-intensive that people
389
will not do them unless they are paid.
Despite the warnings from Professors Benkler and Radin about
commodification, there are certain areas where we should not be
worried about monetization, but instead worried about non-
monetization. For example, failing to pay workers minimum wage
online should not be praised as a new method of peer production—it
should be viewed skeptically, in some instances even condemned in
the event that it leads to exploitation. Those who change the expec-
tations of users halfway through a relationship due to moral hazard
and the lure of money should not have their own expectations re-
spected. At the same time, participants in social entrepreneurship or
a prediction market will likely benefit from having monetary ex-
change as part of their freedom of expression. There is no reason to
fear these forms of exchanges just because they involve money. Re-
turning to Professor Zelizer’s point, money may influence society, but
390
society influences money as well. Perhaps through efforts such as
social entrepreneurship, we can change the way we think about the
very concept of monetization.
386. See generally Yochai Benkler & Helen Nissenbaum, Commons-Based Peer Production
and Virtue, 14 J. POL. PHIL. 394 (2006) (arguing that unpaid peer production is morally
virtuous).
387. See Benkler, supra note 199, at 372 (discussing Coase’s theory of the firm).
388. RICHARD H. THALER & CASS R. SUNSTEIN, NUDGE 6–7 (2008); DANIEL KAHNEMAN &
AMOS TVERSKY, CHOICES, VALUES, AND FRAMES (2000).
389. See Arlene Kaplan Daniels, Invisible Work, 34 SOC. PROBS. 403, 403–11 (1987) (dis-
cussing society’s conceptions of “work” and what “work” should be compensated).
390. See supra note 349 and accompanying text.
2013] CYBER COMMODIFICATION 451
VI. CONCLUSION
Ultimately, our journey across the Internet shows us that cyber-
space is in a state of incomplete commodification. The current land-
scape of cyberspace contains multiple regimes of commodified, non-
commodified, and mixed-use settings. This mixture—which in many
instances defies logic or common sense—tells us that there is no one
natural “state of nature” for the Internet. If anything, the develop-
ment of certain intermediate business models, such as social entre-
preneurship, can potentially reframe the ways that we look at the na-
ture of markets and the theory of the firm.